Dec 13 02:05:34.116012 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:05:34.116213 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:05:34.116232 kernel: BIOS-provided physical RAM map: Dec 13 02:05:34.116410 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 02:05:34.116425 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 02:05:34.116438 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 02:05:34.116598 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 02:05:34.116614 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 02:05:34.116628 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 02:05:34.116642 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 02:05:34.116657 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 02:05:34.116747 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 02:05:34.116766 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 02:05:34.116781 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 02:05:34.116803 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 02:05:34.116819 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 02:05:34.116834 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 02:05:34.116849 kernel: NX (Execute Disable) protection: active Dec 13 02:05:34.116865 kernel: efi: EFI v2.70 by EDK II Dec 13 02:05:34.116881 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 02:05:34.116896 kernel: random: crng init done Dec 13 02:05:34.116911 kernel: SMBIOS 2.4 present. Dec 13 02:05:34.116930 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 02:05:34.116944 kernel: Hypervisor detected: KVM Dec 13 02:05:34.116959 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:05:34.116975 kernel: kvm-clock: cpu 0, msr 3619b001, primary cpu clock Dec 13 02:05:34.116990 kernel: kvm-clock: using sched offset of 12724985136 cycles Dec 13 02:05:34.117006 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:05:34.117022 kernel: tsc: Detected 2299.998 MHz processor Dec 13 02:05:34.117038 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:05:34.117054 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:05:34.117076 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 02:05:34.117096 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:05:34.117111 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 02:05:34.117126 kernel: Using GB pages for direct mapping Dec 13 02:05:34.117142 kernel: Secure boot disabled Dec 13 02:05:34.117158 kernel: ACPI: Early table checksum verification disabled Dec 13 02:05:34.117174 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 02:05:34.117190 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 02:05:34.117206 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 02:05:34.117231 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 02:05:34.117248 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 02:05:34.117264 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 02:05:34.117281 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 02:05:34.117298 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 02:05:34.117315 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 02:05:34.117335 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 02:05:34.117352 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 02:05:34.117390 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 02:05:34.117406 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 02:05:34.117422 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 02:05:34.117438 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 02:05:34.117454 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 02:05:34.117470 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 02:05:34.117487 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 02:05:34.117507 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 02:05:34.117523 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 02:05:34.117539 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:05:34.117556 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:05:34.117572 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:05:34.117589 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 02:05:34.117604 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 02:05:34.117621 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 02:05:34.117638 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 02:05:34.117658 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Dec 13 02:05:34.117674 kernel: Zone ranges: Dec 13 02:05:34.117691 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:05:34.117706 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 02:05:34.117721 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:05:34.117737 kernel: Movable zone start for each node Dec 13 02:05:34.117753 kernel: Early memory node ranges Dec 13 02:05:34.117769 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 02:05:34.117786 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 02:05:34.117806 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 02:05:34.117822 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 02:05:34.117838 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 02:05:34.117874 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:05:34.117891 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 02:05:34.117907 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:05:34.117923 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 02:05:34.117939 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 02:05:34.117956 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 02:05:34.117976 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 02:05:34.117992 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 02:05:34.118009 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:05:34.118026 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:05:34.118042 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:05:34.118059 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:05:34.118083 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:05:34.118100 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:05:34.118116 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:05:34.118136 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:05:34.118151 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:05:34.118167 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 02:05:34.118184 kernel: Booting paravirtualized kernel on KVM Dec 13 02:05:34.118201 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:05:34.118218 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:05:34.118234 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:05:34.118250 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:05:34.118267 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:05:34.118286 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:05:34.118303 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:05:34.118319 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 02:05:34.118335 kernel: Policy zone: Normal Dec 13 02:05:34.118354 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:05:34.118389 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:05:34.118404 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 02:05:34.118421 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:05:34.118437 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:05:34.118458 kernel: Memory: 7515400K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 344884K reserved, 0K cma-reserved) Dec 13 02:05:34.118475 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:05:34.118491 kernel: Kernel/User page tables isolation: enabled Dec 13 02:05:34.118507 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:05:34.118524 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:05:34.118540 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:05:34.118558 kernel: rcu: RCU event tracing is enabled. Dec 13 02:05:34.118575 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:05:34.118596 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:05:34.118625 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:05:34.118643 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:05:34.118663 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:05:34.118680 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:05:34.118698 kernel: Console: colour dummy device 80x25 Dec 13 02:05:34.118716 kernel: printk: console [ttyS0] enabled Dec 13 02:05:34.118733 kernel: ACPI: Core revision 20210730 Dec 13 02:05:34.118750 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:05:34.118767 kernel: x2apic enabled Dec 13 02:05:34.118788 kernel: Switched APIC routing to physical x2apic. Dec 13 02:05:34.118806 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 02:05:34.118824 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:05:34.118841 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 02:05:34.118859 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 02:05:34.118876 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 02:05:34.118894 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:05:34.118915 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:05:34.118932 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:05:34.118948 kernel: Spectre V2 : Mitigation: IBRS Dec 13 02:05:34.118964 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:05:34.118982 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:05:34.118999 kernel: RETBleed: Mitigation: IBRS Dec 13 02:05:34.119016 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:05:34.119033 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 02:05:34.119051 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:05:34.119079 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 02:05:34.119097 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:05:34.119113 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:05:34.119131 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:05:34.119148 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:05:34.119165 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:05:34.119183 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:05:34.119201 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:05:34.119218 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:05:34.119238 kernel: LSM: Security Framework initializing Dec 13 02:05:34.119255 kernel: SELinux: Initializing. Dec 13 02:05:34.119272 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:05:34.119290 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:05:34.119307 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 02:05:34.119324 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 02:05:34.119341 kernel: signal: max sigframe size: 1776 Dec 13 02:05:34.119358 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:05:34.121847 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:05:34.121880 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:05:34.122120 kernel: x86: Booting SMP configuration: Dec 13 02:05:34.122139 kernel: .... node #0, CPUs: #1 Dec 13 02:05:34.122289 kernel: kvm-clock: cpu 1, msr 3619b041, secondary cpu clock Dec 13 02:05:34.122308 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:05:34.122326 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:05:34.122343 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:05:34.122513 kernel: smpboot: Max logical packages: 1 Dec 13 02:05:34.122536 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 02:05:34.122554 kernel: devtmpfs: initialized Dec 13 02:05:34.122571 kernel: x86/mm: Memory block size: 128MB Dec 13 02:05:34.122676 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 02:05:34.122693 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:05:34.122710 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:05:34.122727 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:05:34.122744 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:05:34.122762 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:05:34.122785 kernel: audit: type=2000 audit(1734055532.431:1): state=initialized audit_enabled=0 res=1 Dec 13 02:05:34.122802 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:05:34.122820 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:05:34.122837 kernel: cpuidle: using governor menu Dec 13 02:05:34.122853 kernel: ACPI: bus type PCI registered Dec 13 02:05:34.122870 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:05:34.122888 kernel: dca service started, version 1.12.1 Dec 13 02:05:34.122905 kernel: PCI: Using configuration type 1 for base access Dec 13 02:05:34.122923 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:05:34.122945 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:05:34.122963 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:05:34.122980 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:05:34.122997 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:05:34.123014 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:05:34.123032 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:05:34.123049 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:05:34.123075 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:05:34.123092 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:05:34.123114 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:05:34.123132 kernel: ACPI: Interpreter enabled Dec 13 02:05:34.123148 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:05:34.123165 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:05:34.123183 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:05:34.123200 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:05:34.123217 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:05:34.128683 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:05:34.128891 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:05:34.128916 kernel: PCI host bridge to bus 0000:00 Dec 13 02:05:34.129087 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:05:34.129238 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:05:34.129403 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:05:34.129570 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 02:05:34.129710 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:05:34.129897 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:05:34.130079 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 02:05:34.130249 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 02:05:34.130496 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:05:34.130680 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 02:05:34.130844 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 02:05:34.131015 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 02:05:34.131209 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:05:34.131393 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 02:05:34.131557 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 02:05:34.131724 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:05:34.131890 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 02:05:34.132059 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 02:05:34.132097 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:05:34.132116 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:05:34.132134 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:05:34.132153 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:05:34.132171 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:05:34.132189 kernel: iommu: Default domain type: Translated Dec 13 02:05:34.132208 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:05:34.132227 kernel: vgaarb: loaded Dec 13 02:05:34.132245 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:05:34.132267 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:05:34.132284 kernel: PTP clock support registered Dec 13 02:05:34.132301 kernel: Registered efivars operations Dec 13 02:05:34.132318 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:05:34.132336 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:05:34.132353 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 02:05:34.132626 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 02:05:34.132652 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 02:05:34.132670 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 02:05:34.132692 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 02:05:34.132710 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:05:34.132870 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:05:34.132890 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:05:34.132908 kernel: pnp: PnP ACPI init Dec 13 02:05:34.132926 kernel: pnp: PnP ACPI: found 7 devices Dec 13 02:05:34.133086 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:05:34.133104 kernel: NET: Registered PF_INET protocol family Dec 13 02:05:34.133122 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:05:34.133146 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 02:05:34.133297 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:05:34.133315 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:05:34.133333 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 02:05:34.133350 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 02:05:34.133474 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:05:34.133494 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:05:34.133512 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:05:34.133535 kernel: NET: Registered PF_XDP protocol family Dec 13 02:05:34.133722 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:05:34.133875 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:05:34.134023 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:05:34.134180 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 02:05:34.134353 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:05:34.142216 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:05:34.142246 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 02:05:34.142273 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 02:05:34.142291 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:05:34.142309 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:05:34.142328 kernel: clocksource: Switched to clocksource tsc Dec 13 02:05:34.142345 kernel: Initialise system trusted keyrings Dec 13 02:05:34.142362 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 02:05:34.142394 kernel: Key type asymmetric registered Dec 13 02:05:34.142410 kernel: Asymmetric key parser 'x509' registered Dec 13 02:05:34.142431 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:05:34.142449 kernel: io scheduler mq-deadline registered Dec 13 02:05:34.142467 kernel: io scheduler kyber registered Dec 13 02:05:34.142485 kernel: io scheduler bfq registered Dec 13 02:05:34.142503 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:05:34.142522 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 02:05:34.142750 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 02:05:34.142775 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 02:05:34.142943 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 02:05:34.142971 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 02:05:34.143147 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 02:05:34.143170 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:05:34.143188 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:05:34.143207 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 02:05:34.143224 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 02:05:34.143242 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 02:05:34.143482 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 02:05:34.143517 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:05:34.143535 kernel: i8042: Warning: Keylock active Dec 13 02:05:34.143552 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:05:34.143570 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:05:34.143736 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:05:34.143884 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:05:34.144043 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:05:33 UTC (1734055533) Dec 13 02:05:34.144190 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:05:34.144215 kernel: intel_pstate: CPU model not supported Dec 13 02:05:34.144232 kernel: pstore: Registered efi as persistent store backend Dec 13 02:05:34.144250 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:05:34.144267 kernel: Segment Routing with IPv6 Dec 13 02:05:34.144283 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:05:34.144300 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:05:34.144318 kernel: Key type dns_resolver registered Dec 13 02:05:34.144335 kernel: IPI shorthand broadcast: enabled Dec 13 02:05:34.144352 kernel: sched_clock: Marking stable (746407893, 143517948)->(927546403, -37620562) Dec 13 02:05:34.144397 kernel: registered taskstats version 1 Dec 13 02:05:34.144415 kernel: Loading compiled-in X.509 certificates Dec 13 02:05:34.144432 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:05:34.144450 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:05:34.144466 kernel: Key type .fscrypt registered Dec 13 02:05:34.144483 kernel: Key type fscrypt-provisioning registered Dec 13 02:05:34.144501 kernel: pstore: Using crash dump compression: deflate Dec 13 02:05:34.144518 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:05:34.144536 kernel: ima: No architecture policies found Dec 13 02:05:34.144556 kernel: clk: Disabling unused clocks Dec 13 02:05:34.144573 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:05:34.144591 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:05:34.144608 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:05:34.144624 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:05:34.144641 kernel: Run /init as init process Dec 13 02:05:34.144659 kernel: with arguments: Dec 13 02:05:34.144676 kernel: /init Dec 13 02:05:34.144692 kernel: with environment: Dec 13 02:05:34.144712 kernel: HOME=/ Dec 13 02:05:34.144729 kernel: TERM=linux Dec 13 02:05:34.144745 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:05:34.144767 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:05:34.144788 systemd[1]: Detected virtualization kvm. Dec 13 02:05:34.144806 systemd[1]: Detected architecture x86-64. Dec 13 02:05:34.144824 systemd[1]: Running in initrd. Dec 13 02:05:34.144844 systemd[1]: No hostname configured, using default hostname. Dec 13 02:05:34.144862 systemd[1]: Hostname set to . Dec 13 02:05:34.144881 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:05:34.144898 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:05:34.144916 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:05:34.144934 systemd[1]: Reached target cryptsetup.target. Dec 13 02:05:34.144951 systemd[1]: Reached target paths.target. Dec 13 02:05:34.144968 systemd[1]: Reached target slices.target. Dec 13 02:05:34.144989 systemd[1]: Reached target swap.target. Dec 13 02:05:34.145007 systemd[1]: Reached target timers.target. Dec 13 02:05:34.145035 systemd[1]: Listening on iscsid.socket. Dec 13 02:05:34.145052 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:05:34.145070 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:05:34.145088 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:05:34.145106 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:05:34.145124 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:05:34.145146 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:05:34.145164 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:05:34.145199 systemd[1]: Reached target sockets.target. Dec 13 02:05:34.145221 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:05:34.145240 systemd[1]: Finished network-cleanup.service. Dec 13 02:05:34.145259 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:05:34.145277 systemd[1]: Starting systemd-journald.service... Dec 13 02:05:34.145300 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:05:34.145318 systemd[1]: Starting systemd-resolved.service... Dec 13 02:05:34.145337 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:05:34.145356 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:05:34.145388 kernel: audit: type=1130 audit(1734055534.122:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.145406 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:05:34.145426 kernel: audit: type=1130 audit(1734055534.133:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.145444 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:05:34.145473 systemd-journald[190]: Journal started Dec 13 02:05:34.145565 systemd-journald[190]: Runtime Journal (/run/log/journal/f2f5714537b4f90bf1933aec010aca5d) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:05:34.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.158629 systemd[1]: Started systemd-journald.service. Dec 13 02:05:34.150678 systemd-modules-load[191]: Inserted module 'overlay' Dec 13 02:05:34.179646 kernel: audit: type=1130 audit(1734055534.158:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.179685 kernel: audit: type=1130 audit(1734055534.167:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.165497 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:05:34.168829 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:05:34.178947 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:05:34.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.186394 kernel: audit: type=1130 audit(1734055534.176:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.212304 systemd-resolved[192]: Positive Trust Anchors: Dec 13 02:05:34.212770 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:05:34.212938 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:05:34.218817 systemd-resolved[192]: Defaulting to hostname 'linux'. Dec 13 02:05:34.225705 systemd[1]: Started systemd-resolved.service. Dec 13 02:05:34.237406 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:05:34.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.240061 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:05:34.264676 kernel: audit: type=1130 audit(1734055534.238:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.264718 kernel: Bridge firewalling registered Dec 13 02:05:34.264742 kernel: audit: type=1130 audit(1734055534.249:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.246981 systemd-modules-load[191]: Inserted module 'br_netfilter' Dec 13 02:05:34.250654 systemd[1]: Reached target nss-lookup.target. Dec 13 02:05:34.259896 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:05:34.278387 kernel: SCSI subsystem initialized Dec 13 02:05:34.278656 dracut-cmdline[206]: dracut-dracut-053 Dec 13 02:05:34.282652 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:05:34.301689 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:05:34.301766 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:05:34.304391 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:05:34.309288 systemd-modules-load[191]: Inserted module 'dm_multipath' Dec 13 02:05:34.310356 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:05:34.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.323736 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:05:34.335503 kernel: audit: type=1130 audit(1734055534.321:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.337272 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:05:34.346527 kernel: audit: type=1130 audit(1734055534.339:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.384404 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:05:34.404405 kernel: iscsi: registered transport (tcp) Dec 13 02:05:34.431609 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:05:34.431689 kernel: QLogic iSCSI HBA Driver Dec 13 02:05:34.476895 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:05:34.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.478999 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:05:34.538427 kernel: raid6: avx2x4 gen() 18270 MB/s Dec 13 02:05:34.555450 kernel: raid6: avx2x4 xor() 7749 MB/s Dec 13 02:05:34.572408 kernel: raid6: avx2x2 gen() 18064 MB/s Dec 13 02:05:34.589403 kernel: raid6: avx2x2 xor() 18585 MB/s Dec 13 02:05:34.607411 kernel: raid6: avx2x1 gen() 14166 MB/s Dec 13 02:05:34.624407 kernel: raid6: avx2x1 xor() 16191 MB/s Dec 13 02:05:34.641406 kernel: raid6: sse2x4 gen() 11077 MB/s Dec 13 02:05:34.658405 kernel: raid6: sse2x4 xor() 6615 MB/s Dec 13 02:05:34.676414 kernel: raid6: sse2x2 gen() 12058 MB/s Dec 13 02:05:34.694414 kernel: raid6: sse2x2 xor() 7431 MB/s Dec 13 02:05:34.711415 kernel: raid6: sse2x1 gen() 10536 MB/s Dec 13 02:05:34.729505 kernel: raid6: sse2x1 xor() 5196 MB/s Dec 13 02:05:34.729537 kernel: raid6: using algorithm avx2x4 gen() 18270 MB/s Dec 13 02:05:34.729559 kernel: raid6: .... xor() 7749 MB/s, rmw enabled Dec 13 02:05:34.731049 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:05:34.745409 kernel: xor: automatically using best checksumming function avx Dec 13 02:05:34.853414 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:05:34.864655 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:05:34.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.864000 audit: BPF prog-id=7 op=LOAD Dec 13 02:05:34.864000 audit: BPF prog-id=8 op=LOAD Dec 13 02:05:34.867015 systemd[1]: Starting systemd-udevd.service... Dec 13 02:05:34.884207 systemd-udevd[389]: Using default interface naming scheme 'v252'. Dec 13 02:05:34.891397 systemd[1]: Started systemd-udevd.service. Dec 13 02:05:34.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.896818 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:05:34.917724 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Dec 13 02:05:34.957175 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:05:34.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:34.959534 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:05:35.026689 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:05:35.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:35.101398 kernel: scsi host0: Virtio SCSI HBA Dec 13 02:05:35.109392 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:05:35.152395 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 02:05:35.158467 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:05:35.176404 kernel: AES CTR mode by8 optimization enabled Dec 13 02:05:35.242742 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 02:05:35.258825 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 02:05:35.258995 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 02:05:35.259132 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 02:05:35.259283 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:05:35.259458 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:05:35.259475 kernel: GPT:17805311 != 25165823 Dec 13 02:05:35.259488 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:05:35.259501 kernel: GPT:17805311 != 25165823 Dec 13 02:05:35.259514 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:05:35.259528 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:35.259542 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 02:05:35.308089 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:05:35.319532 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (445) Dec 13 02:05:35.337263 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:05:35.337517 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:05:35.359854 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:05:35.385127 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:05:35.408679 systemd[1]: Starting disk-uuid.service... Dec 13 02:05:35.422873 disk-uuid[510]: Primary Header is updated. Dec 13 02:05:35.422873 disk-uuid[510]: Secondary Entries is updated. Dec 13 02:05:35.422873 disk-uuid[510]: Secondary Header is updated. Dec 13 02:05:35.449515 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:35.478405 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:35.497403 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:36.495392 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:05:36.495686 disk-uuid[511]: The operation has completed successfully. Dec 13 02:05:36.561481 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:05:36.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.561620 systemd[1]: Finished disk-uuid.service. Dec 13 02:05:36.584870 systemd[1]: Starting verity-setup.service... Dec 13 02:05:36.614401 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:05:36.687136 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:05:36.695829 systemd[1]: Finished verity-setup.service. Dec 13 02:05:36.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.711770 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:05:36.810362 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:05:36.810267 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:05:36.817723 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:05:36.818683 systemd[1]: Starting ignition-setup.service... Dec 13 02:05:36.873549 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:05:36.873590 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:05:36.873613 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:05:36.873635 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:05:36.855435 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:05:36.885602 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:05:36.896216 systemd[1]: Finished ignition-setup.service. Dec 13 02:05:36.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.916625 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:05:36.967647 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:05:36.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:36.967000 audit: BPF prog-id=9 op=LOAD Dec 13 02:05:36.970018 systemd[1]: Starting systemd-networkd.service... Dec 13 02:05:37.004834 systemd-networkd[685]: lo: Link UP Dec 13 02:05:37.004847 systemd-networkd[685]: lo: Gained carrier Dec 13 02:05:37.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.005713 systemd-networkd[685]: Enumeration completed Dec 13 02:05:37.005867 systemd[1]: Started systemd-networkd.service. Dec 13 02:05:37.006265 systemd-networkd[685]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:05:37.008780 systemd-networkd[685]: eth0: Link UP Dec 13 02:05:37.008787 systemd-networkd[685]: eth0: Gained carrier Dec 13 02:05:37.012865 systemd[1]: Reached target network.target. Dec 13 02:05:37.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.020587 systemd-networkd[685]: eth0: DHCPv4 address 10.128.0.61/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:05:37.114662 iscsid[695]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:05:37.114662 iscsid[695]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:05:37.114662 iscsid[695]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:05:37.114662 iscsid[695]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:05:37.114662 iscsid[695]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:05:37.114662 iscsid[695]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:05:37.114662 iscsid[695]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:05:37.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.035875 systemd[1]: Starting iscsiuio.service... Dec 13 02:05:37.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.199015 ignition[633]: Ignition 2.14.0 Dec 13 02:05:37.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.045988 systemd[1]: Started iscsiuio.service. Dec 13 02:05:37.199031 ignition[633]: Stage: fetch-offline Dec 13 02:05:37.087729 systemd[1]: Starting iscsid.service... Dec 13 02:05:37.199110 ignition[633]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:37.100650 systemd[1]: Started iscsid.service. Dec 13 02:05:37.199265 ignition[633]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:37.123378 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:05:37.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.215829 ignition[633]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:37.144624 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:05:37.216043 ignition[633]: parsed url from cmdline: "" Dec 13 02:05:37.167868 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:05:37.216051 ignition[633]: no config URL provided Dec 13 02:05:37.208536 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:05:37.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.216060 ignition[633]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:05:37.216511 systemd[1]: Reached target remote-fs.target. Dec 13 02:05:37.216071 ignition[633]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:05:37.234769 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:05:37.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.216080 ignition[633]: failed to fetch config: resource requires networking Dec 13 02:05:37.254853 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:05:37.216256 ignition[633]: Ignition finished successfully Dec 13 02:05:37.273891 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:05:37.302255 ignition[710]: Ignition 2.14.0 Dec 13 02:05:37.289762 systemd[1]: Starting ignition-fetch.service... Dec 13 02:05:37.302263 ignition[710]: Stage: fetch Dec 13 02:05:37.319602 unknown[710]: fetched base config from "system" Dec 13 02:05:37.302432 ignition[710]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:37.319615 unknown[710]: fetched base config from "system" Dec 13 02:05:37.302465 ignition[710]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:37.319626 unknown[710]: fetched user config from "gcp" Dec 13 02:05:37.311944 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:37.333108 systemd[1]: Finished ignition-fetch.service. Dec 13 02:05:37.312136 ignition[710]: parsed url from cmdline: "" Dec 13 02:05:37.348942 systemd[1]: Starting ignition-kargs.service... Dec 13 02:05:37.312141 ignition[710]: no config URL provided Dec 13 02:05:37.380034 systemd[1]: Finished ignition-kargs.service. Dec 13 02:05:37.312149 ignition[710]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:05:37.402241 systemd[1]: Starting ignition-disks.service... Dec 13 02:05:37.312159 ignition[710]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:05:37.432868 systemd[1]: Finished ignition-disks.service. Dec 13 02:05:37.312197 ignition[710]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 02:05:37.448983 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:05:37.316455 ignition[710]: GET result: OK Dec 13 02:05:37.464697 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:05:37.316519 ignition[710]: parsing config with SHA512: ae2d1f22789933ab30cf79c2db8fa657deefbedfa3563263faed7ad1b0a40743512b2f02396bb02356e39a2c9f6aeef8406cf34c401a37f6f6ced06103d4f248 Dec 13 02:05:37.482566 systemd[1]: Reached target local-fs.target. Dec 13 02:05:37.320247 ignition[710]: fetch: fetch complete Dec 13 02:05:37.496571 systemd[1]: Reached target sysinit.target. Dec 13 02:05:37.320254 ignition[710]: fetch: fetch passed Dec 13 02:05:37.509584 systemd[1]: Reached target basic.target. Dec 13 02:05:37.320313 ignition[710]: Ignition finished successfully Dec 13 02:05:37.523871 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:05:37.362462 ignition[716]: Ignition 2.14.0 Dec 13 02:05:37.362471 ignition[716]: Stage: kargs Dec 13 02:05:37.362600 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:37.362631 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:37.370763 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:37.372035 ignition[716]: kargs: kargs passed Dec 13 02:05:37.372095 ignition[716]: Ignition finished successfully Dec 13 02:05:37.414514 ignition[722]: Ignition 2.14.0 Dec 13 02:05:37.414522 ignition[722]: Stage: disks Dec 13 02:05:37.414655 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:37.414685 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:37.422829 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:37.423967 ignition[722]: disks: disks passed Dec 13 02:05:37.424015 ignition[722]: Ignition finished successfully Dec 13 02:05:37.567540 systemd-fsck[730]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:05:37.763397 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:05:37.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:37.772811 systemd[1]: Mounting sysroot.mount... Dec 13 02:05:37.805416 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:05:37.805774 systemd[1]: Mounted sysroot.mount. Dec 13 02:05:37.812653 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:05:37.832838 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:05:37.850082 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:05:37.850176 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:05:37.850235 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:05:37.871168 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:05:37.890548 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:05:37.950564 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (736) Dec 13 02:05:37.950606 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:05:37.950629 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:05:37.950649 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:05:37.950671 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:05:37.937749 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:05:37.961203 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:05:37.982667 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:05:37.992534 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:05:38.002511 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:05:38.013535 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:05:38.045033 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:05:38.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:38.046233 systemd[1]: Starting ignition-mount.service... Dec 13 02:05:38.073575 systemd[1]: Starting sysroot-boot.service... Dec 13 02:05:38.081671 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:05:38.081802 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:05:38.107515 ignition[801]: INFO : Ignition 2.14.0 Dec 13 02:05:38.107515 ignition[801]: INFO : Stage: mount Dec 13 02:05:38.107515 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:38.107515 ignition[801]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:38.210537 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:05:38.210584 kernel: audit: type=1130 audit(1734055538.128:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:38.210611 kernel: audit: type=1130 audit(1734055538.164:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:38.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:38.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:38.210764 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:38.210764 ignition[801]: INFO : mount: mount passed Dec 13 02:05:38.210764 ignition[801]: INFO : Ignition finished successfully Dec 13 02:05:38.282499 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (811) Dec 13 02:05:38.282547 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:05:38.282571 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:05:38.282594 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:05:38.282625 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:05:38.114447 systemd[1]: Finished sysroot-boot.service. Dec 13 02:05:38.129940 systemd[1]: Finished ignition-mount.service. Dec 13 02:05:38.167151 systemd[1]: Starting ignition-files.service... Dec 13 02:05:38.314586 ignition[830]: INFO : Ignition 2.14.0 Dec 13 02:05:38.314586 ignition[830]: INFO : Stage: files Dec 13 02:05:38.314586 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:38.314586 ignition[830]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:38.314586 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:38.382515 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (834) Dec 13 02:05:38.221676 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:05:38.390549 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:05:38.390549 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:05:38.390549 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:05:38.390549 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:05:38.390549 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:05:38.390549 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem886975480" Dec 13 02:05:38.390549 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem886975480": device or resource busy Dec 13 02:05:38.390549 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem886975480", trying btrfs: device or resource busy Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem886975480" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem886975480" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem886975480" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem886975480" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:05:38.390549 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:38.278545 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3167309074" Dec 13 02:05:38.663605 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3167309074": device or resource busy Dec 13 02:05:38.663605 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3167309074", trying btrfs: device or resource busy Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3167309074" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3167309074" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem3167309074" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem3167309074" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:05:38.663605 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:05:38.330590 unknown[830]: wrote ssh authorized keys file for user: core Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4251727239" Dec 13 02:05:38.914580 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4251727239": device or resource busy Dec 13 02:05:38.914580 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4251727239", trying btrfs: device or resource busy Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4251727239" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4251727239" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem4251727239" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem4251727239" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:05:38.914580 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4235174197" Dec 13 02:05:38.914580 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4235174197": device or resource busy Dec 13 02:05:38.799540 systemd-networkd[685]: eth0: Gained IPv6LL Dec 13 02:05:39.164586 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4235174197", trying btrfs: device or resource busy Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4235174197" Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4235174197" Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem4235174197" Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem4235174197" Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 02:05:39.164586 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Dec 13 02:05:39.387098 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:05:39.387098 ignition[830]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:05:39.387098 ignition[830]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:05:39.387098 ignition[830]: INFO : files: op(18): [started] processing unit "oem-gce.service" Dec 13 02:05:39.387098 ignition[830]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Dec 13 02:05:39.490563 kernel: audit: type=1130 audit(1734055539.404:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.396043 systemd[1]: Finished ignition-files.service. Dec 13 02:05:39.528753 kernel: audit: type=1130 audit(1734055539.499:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce.service" Dec 13 02:05:39.528860 ignition[830]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce.service" Dec 13 02:05:39.528860 ignition[830]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:05:39.528860 ignition[830]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:05:39.528860 ignition[830]: INFO : files: files passed Dec 13 02:05:39.528860 ignition[830]: INFO : Ignition finished successfully Dec 13 02:05:39.836710 kernel: audit: type=1130 audit(1734055539.535:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.836756 kernel: audit: type=1131 audit(1734055539.535:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.836773 kernel: audit: type=1130 audit(1734055539.626:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.836788 kernel: audit: type=1131 audit(1734055539.626:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.836802 kernel: audit: type=1130 audit(1734055539.758:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.415449 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:05:39.854817 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:05:39.462658 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:05:39.463796 systemd[1]: Starting ignition-quench.service... Dec 13 02:05:39.935588 kernel: audit: type=1131 audit(1734055539.907:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.474022 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:05:39.501140 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:05:39.501280 systemd[1]: Finished ignition-quench.service. Dec 13 02:05:39.536797 systemd[1]: Reached target ignition-complete.target. Dec 13 02:05:39.589806 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:05:39.627256 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:05:39.627406 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:05:39.627857 systemd[1]: Reached target initrd-fs.target. Dec 13 02:05:39.707714 systemd[1]: Reached target initrd.target. Dec 13 02:05:39.721875 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:05:39.723214 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:05:39.746865 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:05:39.761348 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:05:39.828924 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:05:39.844859 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:05:39.862885 systemd[1]: Stopped target timers.target. Dec 13 02:05:39.883800 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:05:40.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.884021 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:05:39.909104 systemd[1]: Stopped target initrd.target. Dec 13 02:05:40.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.942922 systemd[1]: Stopped target basic.target. Dec 13 02:05:40.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.958882 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:05:40.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.974908 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:05:40.221601 ignition[868]: INFO : Ignition 2.14.0 Dec 13 02:05:40.221601 ignition[868]: INFO : Stage: umount Dec 13 02:05:40.221601 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:05:40.221601 ignition[868]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:05:40.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:39.989853 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:05:40.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.300752 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:05:40.300752 ignition[868]: INFO : umount: umount passed Dec 13 02:05:40.300752 ignition[868]: INFO : Ignition finished successfully Dec 13 02:05:40.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.005857 systemd[1]: Stopped target remote-fs.target. Dec 13 02:05:40.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.028839 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:05:40.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.049889 systemd[1]: Stopped target sysinit.target. Dec 13 02:05:40.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.056951 systemd[1]: Stopped target local-fs.target. Dec 13 02:05:40.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.073958 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:05:40.101984 systemd[1]: Stopped target swap.target. Dec 13 02:05:40.121829 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:05:40.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.122033 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:05:40.143105 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:05:40.159971 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:05:40.160207 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:05:40.167142 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:05:40.167338 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:05:40.189974 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:05:40.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.190154 systemd[1]: Stopped ignition-files.service. Dec 13 02:05:40.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.206503 systemd[1]: Stopping ignition-mount.service... Dec 13 02:05:40.230803 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:05:40.231048 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:05:40.245549 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:05:40.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.260799 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:05:40.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.261051 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:05:40.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.637000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:05:40.292982 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:05:40.293168 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:05:40.313022 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:05:40.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.314434 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:05:40.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.314584 systemd[1]: Stopped ignition-mount.service. Dec 13 02:05:40.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.335313 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:05:40.335462 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:05:40.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.351405 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:05:40.351573 systemd[1]: Stopped ignition-disks.service. Dec 13 02:05:40.365732 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:05:40.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.365805 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:05:40.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.381734 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:05:40.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.381802 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:05:40.396748 systemd[1]: Stopped target network.target. Dec 13 02:05:40.411702 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:05:40.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.411793 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:05:40.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.432778 systemd[1]: Stopped target paths.target. Dec 13 02:05:40.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:40.447685 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:05:40.452510 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:05:40.454748 systemd[1]: Stopped target slices.target. Dec 13 02:05:40.482555 systemd[1]: Stopped target sockets.target. Dec 13 02:05:40.482772 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:05:40.482808 systemd[1]: Closed iscsid.socket. Dec 13 02:05:40.979561 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Dec 13 02:05:40.979626 iscsid[695]: iscsid shutting down. Dec 13 02:05:40.502604 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:05:40.502665 systemd[1]: Closed iscsiuio.socket. Dec 13 02:05:40.519590 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:05:40.519708 systemd[1]: Stopped ignition-setup.service. Dec 13 02:05:40.535638 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:05:40.535740 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:05:40.551882 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:05:40.555425 systemd-networkd[685]: eth0: DHCPv6 lease lost Dec 13 02:05:40.566774 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:05:40.584201 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:05:40.584324 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:05:40.605350 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:05:40.605521 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:05:40.620379 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:05:40.620499 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:05:40.638690 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:05:40.638738 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:05:40.654662 systemd[1]: Stopping network-cleanup.service... Dec 13 02:05:40.663724 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:05:40.663813 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:05:40.684746 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:05:40.684819 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:05:40.701936 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:05:40.702016 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:05:40.717857 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:05:40.734074 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:05:40.734744 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:05:40.734892 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:05:40.749963 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:05:40.750047 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:05:40.763647 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:05:40.763708 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:05:40.779579 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:05:40.779676 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:05:40.794724 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:05:40.794806 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:05:40.810681 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:05:40.810754 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:05:40.826662 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:05:40.848638 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:05:40.848758 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:05:40.864171 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:05:40.864299 systemd[1]: Stopped network-cleanup.service. Dec 13 02:05:40.882027 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:05:40.882145 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:05:40.897846 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:05:40.913717 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:05:40.938844 systemd[1]: Switching root. Dec 13 02:05:40.981894 systemd-journald[190]: Journal stopped Dec 13 02:05:45.673549 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:05:45.673671 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:05:45.673708 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:05:45.673742 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:05:45.673770 kernel: SELinux: policy capability open_perms=1 Dec 13 02:05:45.673793 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:05:45.673816 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:05:45.673840 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:05:45.673863 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:05:45.673885 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:05:45.673911 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:05:45.673937 systemd[1]: Successfully loaded SELinux policy in 110.121ms. Dec 13 02:05:45.673974 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.680ms. Dec 13 02:05:45.673999 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:05:45.674022 systemd[1]: Detected virtualization kvm. Dec 13 02:05:45.674044 systemd[1]: Detected architecture x86-64. Dec 13 02:05:45.674066 systemd[1]: Detected first boot. Dec 13 02:05:45.674090 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:05:45.674117 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:05:45.674139 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:05:45.674164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:05:45.674195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:05:45.674222 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:05:45.674255 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 02:05:45.674279 kernel: audit: type=1334 audit(1734055544.750:86): prog-id=12 op=LOAD Dec 13 02:05:45.674482 kernel: audit: type=1334 audit(1734055544.750:87): prog-id=3 op=UNLOAD Dec 13 02:05:45.674515 kernel: audit: type=1334 audit(1734055544.763:88): prog-id=13 op=LOAD Dec 13 02:05:45.674539 kernel: audit: type=1334 audit(1734055544.777:89): prog-id=14 op=LOAD Dec 13 02:05:45.674562 kernel: audit: type=1334 audit(1734055544.777:90): prog-id=4 op=UNLOAD Dec 13 02:05:45.674585 kernel: audit: type=1334 audit(1734055544.777:91): prog-id=5 op=UNLOAD Dec 13 02:05:45.674608 kernel: audit: type=1334 audit(1734055544.791:92): prog-id=15 op=LOAD Dec 13 02:05:45.674630 kernel: audit: type=1334 audit(1734055544.791:93): prog-id=12 op=UNLOAD Dec 13 02:05:45.674652 kernel: audit: type=1334 audit(1734055544.798:94): prog-id=16 op=LOAD Dec 13 02:05:45.674676 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:05:45.674707 kernel: audit: type=1334 audit(1734055544.805:95): prog-id=17 op=LOAD Dec 13 02:05:45.674734 systemd[1]: Stopped iscsiuio.service. Dec 13 02:05:45.674757 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:05:45.674780 systemd[1]: Stopped iscsid.service. Dec 13 02:05:45.674802 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:05:45.674825 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:05:45.674849 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:05:45.674876 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:05:45.674899 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:05:45.674922 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:05:45.674952 systemd[1]: Created slice system-getty.slice. Dec 13 02:05:45.674975 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:05:45.674998 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:05:45.675021 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:05:45.675045 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:05:45.675067 systemd[1]: Created slice user.slice. Dec 13 02:05:45.675094 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:05:45.675117 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:05:45.675146 systemd[1]: Set up automount boot.automount. Dec 13 02:05:45.675169 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:05:45.675194 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:05:45.675217 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:05:45.675239 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:05:45.675263 systemd[1]: Reached target integritysetup.target. Dec 13 02:05:45.675286 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:05:45.675321 systemd[1]: Reached target remote-fs.target. Dec 13 02:05:45.675344 systemd[1]: Reached target slices.target. Dec 13 02:05:45.675391 systemd[1]: Reached target swap.target. Dec 13 02:05:45.675416 systemd[1]: Reached target torcx.target. Dec 13 02:05:45.675439 systemd[1]: Reached target veritysetup.target. Dec 13 02:05:45.675463 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:05:45.675487 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:05:45.675512 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:05:45.675537 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:05:45.675565 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:05:45.675592 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:05:45.675616 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:05:45.675640 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:05:45.675663 systemd[1]: Mounting media.mount... Dec 13 02:05:45.675785 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:45.675816 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:05:45.675842 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:05:45.675866 systemd[1]: Mounting tmp.mount... Dec 13 02:05:45.675890 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:05:45.675919 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:45.675943 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:05:45.675968 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:05:45.675992 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:45.676017 systemd[1]: Starting modprobe@drm.service... Dec 13 02:05:45.676040 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:45.676065 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:05:45.676089 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:45.676111 kernel: fuse: init (API version 7.34) Dec 13 02:05:45.676142 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:05:45.676166 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:05:45.676190 kernel: loop: module loaded Dec 13 02:05:45.676215 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:05:45.676238 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:05:45.676263 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:05:45.676287 systemd[1]: Stopped systemd-journald.service. Dec 13 02:05:45.676320 systemd[1]: Starting systemd-journald.service... Dec 13 02:05:45.676345 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:05:45.676397 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:05:45.676432 systemd-journald[992]: Journal started Dec 13 02:05:45.676530 systemd-journald[992]: Runtime Journal (/run/log/journal/f2f5714537b4f90bf1933aec010aca5d) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:05:40.981000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:05:41.284000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:05:41.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:05:41.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:05:41.439000 audit: BPF prog-id=10 op=LOAD Dec 13 02:05:41.439000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:05:41.439000 audit: BPF prog-id=11 op=LOAD Dec 13 02:05:41.439000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:05:41.605000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:05:41.605000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:41.605000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:05:41.615000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:05:41.615000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:41.615000 audit: CWD cwd="/" Dec 13 02:05:41.615000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:41.615000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:41.615000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:05:44.750000 audit: BPF prog-id=12 op=LOAD Dec 13 02:05:44.750000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:05:44.763000 audit: BPF prog-id=13 op=LOAD Dec 13 02:05:44.777000 audit: BPF prog-id=14 op=LOAD Dec 13 02:05:44.777000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:05:44.777000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:05:44.791000 audit: BPF prog-id=15 op=LOAD Dec 13 02:05:44.791000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:05:44.798000 audit: BPF prog-id=16 op=LOAD Dec 13 02:05:44.805000 audit: BPF prog-id=17 op=LOAD Dec 13 02:05:44.805000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:05:44.805000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:05:44.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.838000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:05:44.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:44.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.628000 audit: BPF prog-id=18 op=LOAD Dec 13 02:05:45.628000 audit: BPF prog-id=19 op=LOAD Dec 13 02:05:45.628000 audit: BPF prog-id=20 op=LOAD Dec 13 02:05:45.628000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:05:45.628000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:05:45.669000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:05:45.669000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe9937e120 a2=4000 a3=7ffe9937e1bc items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:45.669000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:05:44.750130 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:05:41.596970 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:05:44.814960 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:05:41.598159 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:05:41.598194 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:05:41.598248 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:05:41.598268 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:05:41.598328 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:05:41.598362 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:05:41.598718 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:05:41.598785 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:05:41.598810 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:05:41.602188 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:05:41.602261 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:05:41.602299 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:05:41.602329 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:05:41.602385 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:05:41.602414 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:05:44.127884 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:44Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:44.128176 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:44Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:44.128304 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:44Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:44.128559 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:44Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:05:44.128621 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:44Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:05:44.128691 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T02:05:44Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:05:45.687461 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:05:45.702525 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:05:45.721781 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:05:45.722171 systemd[1]: Stopped verity-setup.service. Dec 13 02:05:45.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.741479 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:45.751434 systemd[1]: Started systemd-journald.service. Dec 13 02:05:45.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.760081 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:05:45.767752 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:05:45.776753 systemd[1]: Mounted media.mount. Dec 13 02:05:45.783754 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:05:45.792719 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:05:45.801747 systemd[1]: Mounted tmp.mount. Dec 13 02:05:45.808893 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:05:45.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.817959 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:05:45.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.826933 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:05:45.827156 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:05:45.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.835982 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:45.836218 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:45.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.844994 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:05:45.845219 systemd[1]: Finished modprobe@drm.service. Dec 13 02:05:45.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.853980 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:45.854201 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:45.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.862966 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:05:45.863194 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:05:45.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.871924 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:45.872143 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:45.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.880910 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:05:45.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.889831 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:05:45.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.898885 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:05:45.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.907888 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:05:45.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.917315 systemd[1]: Reached target network-pre.target. Dec 13 02:05:45.927018 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:05:45.937009 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:05:45.944524 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:05:45.947655 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:05:45.956266 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:05:45.964559 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:45.966310 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:05:45.973570 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:45.975420 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:05:45.978957 systemd-journald[992]: Time spent on flushing to /var/log/journal/f2f5714537b4f90bf1933aec010aca5d is 64.848ms for 1138 entries. Dec 13 02:05:45.978957 systemd-journald[992]: System Journal (/var/log/journal/f2f5714537b4f90bf1933aec010aca5d) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:05:46.079652 systemd-journald[992]: Received client request to flush runtime journal. Dec 13 02:05:46.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:45.992260 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:05:46.001226 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:05:46.081312 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:05:46.011988 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:05:46.020837 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:05:46.029909 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:05:46.043101 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:05:46.052146 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:05:46.069881 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:05:46.080877 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:05:46.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.664965 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:05:46.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.673000 audit: BPF prog-id=21 op=LOAD Dec 13 02:05:46.673000 audit: BPF prog-id=22 op=LOAD Dec 13 02:05:46.673000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:05:46.673000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:05:46.675495 systemd[1]: Starting systemd-udevd.service... Dec 13 02:05:46.699824 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Dec 13 02:05:46.752350 systemd[1]: Started systemd-udevd.service. Dec 13 02:05:46.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.762000 audit: BPF prog-id=23 op=LOAD Dec 13 02:05:46.765111 systemd[1]: Starting systemd-networkd.service... Dec 13 02:05:46.777000 audit: BPF prog-id=24 op=LOAD Dec 13 02:05:46.778000 audit: BPF prog-id=25 op=LOAD Dec 13 02:05:46.778000 audit: BPF prog-id=26 op=LOAD Dec 13 02:05:46.780647 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:05:46.843595 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:05:46.846131 systemd[1]: Started systemd-userdbd.service. Dec 13 02:05:46.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.969729 systemd-networkd[1024]: lo: Link UP Dec 13 02:05:46.969749 systemd-networkd[1024]: lo: Gained carrier Dec 13 02:05:46.970516 systemd-networkd[1024]: Enumeration completed Dec 13 02:05:46.970652 systemd[1]: Started systemd-networkd.service. Dec 13 02:05:46.971124 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:05:46.981406 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1011) Dec 13 02:05:46.983085 systemd-networkd[1024]: eth0: Link UP Dec 13 02:05:46.983104 systemd-networkd[1024]: eth0: Gained carrier Dec 13 02:05:46.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:46.993586 systemd-networkd[1024]: eth0: DHCPv4 address 10.128.0.61/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:05:47.019406 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:05:47.061399 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:05:47.067398 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:05:47.052000 audit[1013]: AVC avc: denied { confidentiality } for pid=1013 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:05:47.052000 audit[1013]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56333f67c2d0 a1=337fc a2=7f9e887f5bc5 a3=5 items=110 ppid=1010 pid=1013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:47.052000 audit: CWD cwd="/" Dec 13 02:05:47.052000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=1 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=2 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=3 name=(null) inode=14101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=4 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=5 name=(null) inode=14102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=6 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=7 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=8 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=9 name=(null) inode=14104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=10 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=11 name=(null) inode=14105 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=12 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=13 name=(null) inode=14106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=14 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=15 name=(null) inode=14107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=16 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=17 name=(null) inode=14108 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=18 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=19 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=20 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=21 name=(null) inode=14110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=22 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=23 name=(null) inode=14111 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=24 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=25 name=(null) inode=14112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=26 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=27 name=(null) inode=14113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=28 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=29 name=(null) inode=14114 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=30 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=31 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=32 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=33 name=(null) inode=14116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=34 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=35 name=(null) inode=14117 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=36 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=37 name=(null) inode=14118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=38 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=39 name=(null) inode=14119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=40 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=41 name=(null) inode=14120 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=42 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=43 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=44 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=45 name=(null) inode=14122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=46 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=47 name=(null) inode=14123 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=48 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=49 name=(null) inode=14124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=50 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=51 name=(null) inode=14125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=52 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=53 name=(null) inode=14126 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=55 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=56 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=57 name=(null) inode=14128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=58 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.087396 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 02:05:47.052000 audit: PATH item=59 name=(null) inode=14129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=60 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=61 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=62 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=63 name=(null) inode=14131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=64 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=65 name=(null) inode=14132 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=66 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=67 name=(null) inode=14133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=68 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=69 name=(null) inode=14134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=70 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=71 name=(null) inode=14135 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=72 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=73 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=74 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=75 name=(null) inode=14137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=76 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=77 name=(null) inode=14138 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=78 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=79 name=(null) inode=14139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=80 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=81 name=(null) inode=14140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=82 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=83 name=(null) inode=14141 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=84 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=85 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=86 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=87 name=(null) inode=14143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=88 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=89 name=(null) inode=14144 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=90 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=91 name=(null) inode=14145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=92 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=93 name=(null) inode=14146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=94 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=95 name=(null) inode=14147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=96 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=97 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=98 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=99 name=(null) inode=14149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=100 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=101 name=(null) inode=14150 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=102 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=103 name=(null) inode=14151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=104 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=105 name=(null) inode=14152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=106 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=107 name=(null) inode=14153 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PATH item=109 name=(null) inode=14154 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:47.052000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:05:47.115443 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:05:47.125395 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:05:47.136405 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 02:05:47.166419 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 02:05:47.177423 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:05:47.194887 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:05:47.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.205240 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:05:47.233560 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:05:47.266732 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:05:47.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.275746 systemd[1]: Reached target cryptsetup.target. Dec 13 02:05:47.286056 systemd[1]: Starting lvm2-activation.service... Dec 13 02:05:47.292056 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:05:47.324825 systemd[1]: Finished lvm2-activation.service. Dec 13 02:05:47.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.333705 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:05:47.342538 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:05:47.342589 systemd[1]: Reached target local-fs.target. Dec 13 02:05:47.350544 systemd[1]: Reached target machines.target. Dec 13 02:05:47.360062 systemd[1]: Starting ldconfig.service... Dec 13 02:05:47.368574 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:47.368669 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:47.370403 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:05:47.379120 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:05:47.390147 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:05:47.392222 systemd[1]: Starting systemd-sysext.service... Dec 13 02:05:47.392862 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Dec 13 02:05:47.395200 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:05:47.420717 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:05:47.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.425685 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:05:47.433987 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:05:47.434283 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:05:47.458673 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 02:05:47.565224 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) Dec 13 02:05:47.565224 systemd-fsck[1061]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:05:47.568347 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:05:47.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.580693 systemd[1]: Mounting boot.mount... Dec 13 02:05:47.616201 systemd[1]: Mounted boot.mount. Dec 13 02:05:47.641196 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:05:47.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.776085 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:05:47.777049 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:05:47.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.807471 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:05:47.835415 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 02:05:47.863205 (sd-sysext)[1065]: Using extensions 'kubernetes'. Dec 13 02:05:47.865171 (sd-sysext)[1065]: Merged extensions into '/usr'. Dec 13 02:05:47.891560 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:47.893995 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:05:47.902768 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:47.904738 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:47.913517 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:47.922320 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:47.929661 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:47.929917 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:47.930116 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:47.935113 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:05:47.943201 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:47.943477 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:47.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.952279 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:47.952471 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:47.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.962254 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:47.962478 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:47.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.971335 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:47.971539 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:47.973517 systemd[1]: Finished systemd-sysext.service. Dec 13 02:05:47.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:47.984574 systemd[1]: Starting ensure-sysext.service... Dec 13 02:05:47.993432 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:05:48.005043 systemd[1]: Reloading. Dec 13 02:05:48.037235 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:05:48.042487 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:05:48.052228 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:05:48.063933 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:05:48.105465 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2024-12-13T02:05:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:05:48.105514 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2024-12-13T02:05:48Z" level=info msg="torcx already run" Dec 13 02:05:48.293104 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:05:48.293139 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:05:48.329157 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:05:48.405000 audit: BPF prog-id=27 op=LOAD Dec 13 02:05:48.405000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:05:48.406000 audit: BPF prog-id=28 op=LOAD Dec 13 02:05:48.406000 audit: BPF prog-id=29 op=LOAD Dec 13 02:05:48.406000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:05:48.406000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:05:48.408000 audit: BPF prog-id=30 op=LOAD Dec 13 02:05:48.408000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:05:48.408000 audit: BPF prog-id=31 op=LOAD Dec 13 02:05:48.408000 audit: BPF prog-id=32 op=LOAD Dec 13 02:05:48.408000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:05:48.408000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:05:48.410000 audit: BPF prog-id=33 op=LOAD Dec 13 02:05:48.410000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:05:48.410000 audit: BPF prog-id=34 op=LOAD Dec 13 02:05:48.410000 audit: BPF prog-id=35 op=LOAD Dec 13 02:05:48.410000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:05:48.410000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:05:48.417455 systemd[1]: Finished ldconfig.service. Dec 13 02:05:48.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:48.426352 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:05:48.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:48.442308 systemd[1]: Starting audit-rules.service... Dec 13 02:05:48.451885 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:05:48.462742 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:05:48.473979 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:05:48.482000 audit: BPF prog-id=36 op=LOAD Dec 13 02:05:48.485651 systemd[1]: Starting systemd-resolved.service... Dec 13 02:05:48.492000 audit: BPF prog-id=37 op=LOAD Dec 13 02:05:48.495105 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:05:48.504627 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:05:48.513893 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:05:48.513000 audit[1161]: SYSTEM_BOOT pid=1161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:05:48.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:48.523450 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:05:48.523709 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:05:48.523000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:05:48.524793 augenrules[1165]: No rules Dec 13 02:05:48.523000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2e314dc0 a2=420 a3=0 items=0 ppid=1136 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:48.523000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:05:48.533259 systemd[1]: Finished audit-rules.service. Dec 13 02:05:48.541181 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:05:48.556690 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:48.557267 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.559937 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:48.570125 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:48.580014 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:48.589930 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:05:48.598604 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.602662 enable-oslogin[1174]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:05:48.599004 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:48.602125 systemd[1]: Starting systemd-update-done.service... Dec 13 02:05:48.609540 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:05:48.609891 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:48.613915 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:48.614189 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:48.623515 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:48.623735 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:48.633538 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:48.633761 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:48.643438 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:05:48.643690 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:05:48.654408 systemd[1]: Finished systemd-update-done.service. Dec 13 02:05:48.663578 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:48.663845 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.668060 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:48.671401 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.673612 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:05:48.232606 systemd-timesyncd[1157]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 02:05:48.273897 systemd-journald[992]: Time jumped backwards, rotating. Dec 13 02:05:48.232690 systemd-timesyncd[1157]: Initial clock synchronization to Fri 2024-12-13 02:05:48.232462 UTC. Dec 13 02:05:48.234515 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:05:48.249938 systemd[1]: Starting modprobe@loop.service... Dec 13 02:05:48.252008 systemd-resolved[1153]: Positive Trust Anchors: Dec 13 02:05:48.274848 enable-oslogin[1181]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:05:48.252024 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:05:48.252081 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:05:48.259001 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:05:48.267724 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.267987 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:48.268180 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:05:48.268333 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:05:48.270248 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:05:48.281064 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:05:48.290994 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:05:48.291238 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:05:48.297113 systemd-resolved[1153]: Defaulting to hostname 'linux'. Dec 13 02:05:48.300082 systemd[1]: Started systemd-resolved.service. Dec 13 02:05:48.309276 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:05:48.309508 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:05:48.319341 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:05:48.319571 systemd[1]: Finished modprobe@loop.service. Dec 13 02:05:48.328413 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:05:48.328733 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:05:48.339453 systemd[1]: Reached target network.target. Dec 13 02:05:48.347814 systemd[1]: Reached target nss-lookup.target. Dec 13 02:05:48.356862 systemd[1]: Reached target time-set.target. Dec 13 02:05:48.365827 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:05:48.366078 systemd[1]: Reached target sysinit.target. Dec 13 02:05:48.375024 systemd[1]: Started motdgen.path. Dec 13 02:05:48.382031 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:05:48.392165 systemd[1]: Started logrotate.timer. Dec 13 02:05:48.400083 systemd[1]: Started mdadm.timer. Dec 13 02:05:48.407964 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:05:48.416823 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:05:48.417057 systemd[1]: Reached target paths.target. Dec 13 02:05:48.424900 systemd[1]: Reached target timers.target. Dec 13 02:05:48.432345 systemd[1]: Listening on dbus.socket. Dec 13 02:05:48.441639 systemd[1]: Starting docker.socket... Dec 13 02:05:48.453556 systemd[1]: Listening on sshd.socket. Dec 13 02:05:48.460952 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:48.461231 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.464135 systemd[1]: Listening on docker.socket. Dec 13 02:05:48.464627 systemd-networkd[1024]: eth0: Gained IPv6LL Dec 13 02:05:48.474395 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:05:48.474702 systemd[1]: Reached target sockets.target. Dec 13 02:05:48.483850 systemd[1]: Reached target basic.target. Dec 13 02:05:48.490878 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.491165 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:05:48.493191 systemd[1]: Starting containerd.service... Dec 13 02:05:48.502458 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:05:48.512933 systemd[1]: Starting dbus.service... Dec 13 02:05:48.522900 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:05:48.532184 systemd[1]: Starting extend-filesystems.service... Dec 13 02:05:48.539659 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:05:48.545202 jq[1187]: false Dec 13 02:05:48.542205 systemd[1]: Starting modprobe@drm.service... Dec 13 02:05:48.551724 systemd[1]: Starting motdgen.service... Dec 13 02:05:48.560578 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:05:48.572596 systemd[1]: Starting sshd-keygen.service... Dec 13 02:05:48.583067 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:05:48.591862 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:05:48.592142 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 02:05:48.593122 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:05:48.594739 systemd[1]: Starting update-engine.service... Dec 13 02:05:48.604833 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:05:48.619275 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:05:48.619575 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:05:48.620355 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:05:48.621246 jq[1207]: true Dec 13 02:05:48.621762 systemd[1]: Finished modprobe@drm.service. Dec 13 02:05:48.630876 extend-filesystems[1188]: Found loop1 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda1 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda2 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda3 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found usr Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda4 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda6 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda7 Dec 13 02:05:48.638684 extend-filesystems[1188]: Found sda9 Dec 13 02:05:48.638684 extend-filesystems[1188]: Checking size of /dev/sda9 Dec 13 02:05:48.830451 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 02:05:48.830540 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 02:05:48.631745 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:05:48.830805 update_engine[1206]: I1213 02:05:48.799810 1206 main.cc:92] Flatcar Update Engine starting Dec 13 02:05:48.830805 update_engine[1206]: I1213 02:05:48.820748 1206 update_check_scheduler.cc:74] Next update check in 8m36s Dec 13 02:05:48.831262 extend-filesystems[1188]: Resized partition /dev/sda9 Dec 13 02:05:48.730197 dbus-daemon[1186]: [system] SELinux support is enabled Dec 13 02:05:48.631992 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:05:48.879272 extend-filesystems[1216]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:05:48.879272 extend-filesystems[1216]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 02:05:48.879272 extend-filesystems[1216]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 02:05:48.879272 extend-filesystems[1216]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 02:05:48.938154 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:05:48.938243 jq[1217]: true Dec 13 02:05:48.737639 dbus-daemon[1186]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1024 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:05:48.639626 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:05:48.938705 extend-filesystems[1188]: Resized filesystem in /dev/sda9 Dec 13 02:05:48.960697 env[1218]: time="2024-12-13T02:05:48.938997879Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:05:48.789882 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:05:48.661689 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:05:48.661968 systemd[1]: Finished motdgen.service. Dec 13 02:05:48.688867 systemd[1]: Reached target network-online.target. Dec 13 02:05:48.704422 systemd[1]: Starting kubelet.service... Dec 13 02:05:48.725755 systemd[1]: Starting oem-gce.service... Dec 13 02:05:48.748356 systemd[1]: Starting systemd-logind.service... Dec 13 02:05:48.963332 bash[1252]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:05:48.756104 systemd[1]: Started dbus.service. Dec 13 02:05:48.767747 systemd[1]: Finished ensure-sysext.service. Dec 13 02:05:48.963830 mkfs.ext4[1236]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 02:05:48.963830 mkfs.ext4[1236]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 02:05:48.963830 mkfs.ext4[1236]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 02:05:48.963830 mkfs.ext4[1236]: Filesystem UUID: 59141975-ddfa-4cc1-9748-b59cf3e7c041 Dec 13 02:05:48.963830 mkfs.ext4[1236]: Superblock backups stored on blocks: Dec 13 02:05:48.963830 mkfs.ext4[1236]: 32768, 98304, 163840, 229376 Dec 13 02:05:48.963830 mkfs.ext4[1236]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:05:48.963830 mkfs.ext4[1236]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:05:48.963830 mkfs.ext4[1236]: Creating journal (8192 blocks): done Dec 13 02:05:48.963830 mkfs.ext4[1236]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:05:48.788838 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:05:48.788885 systemd[1]: Reached target system-config.target. Dec 13 02:05:48.797695 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:05:48.797729 systemd[1]: Reached target user-config.target. Dec 13 02:05:48.966117 umount[1250]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 02:05:48.815673 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:05:48.838193 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:05:48.838521 systemd[1]: Finished extend-filesystems.service. Dec 13 02:05:48.846991 systemd[1]: Started update-engine.service. Dec 13 02:05:48.860110 systemd[1]: Started locksmithd.service. Dec 13 02:05:48.931005 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:05:48.997242 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:05:49.082808 coreos-metadata[1185]: Dec 13 02:05:49.082 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 02:05:49.088031 coreos-metadata[1185]: Dec 13 02:05:49.087 INFO Fetch failed with 404: resource not found Dec 13 02:05:49.088255 coreos-metadata[1185]: Dec 13 02:05:49.088 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 02:05:49.089357 coreos-metadata[1185]: Dec 13 02:05:49.089 INFO Fetch successful Dec 13 02:05:49.089578 coreos-metadata[1185]: Dec 13 02:05:49.089 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 02:05:49.090599 coreos-metadata[1185]: Dec 13 02:05:49.090 INFO Fetch failed with 404: resource not found Dec 13 02:05:49.090809 coreos-metadata[1185]: Dec 13 02:05:49.090 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 02:05:49.091735 coreos-metadata[1185]: Dec 13 02:05:49.091 INFO Fetch failed with 404: resource not found Dec 13 02:05:49.091936 coreos-metadata[1185]: Dec 13 02:05:49.091 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 02:05:49.093587 coreos-metadata[1185]: Dec 13 02:05:49.093 INFO Fetch successful Dec 13 02:05:49.093922 systemd-logind[1227]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:05:49.095320 systemd-logind[1227]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 02:05:49.096415 systemd-logind[1227]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:05:49.097835 unknown[1185]: wrote ssh authorized keys file for user: core Dec 13 02:05:49.102267 systemd-logind[1227]: New seat seat0. Dec 13 02:05:49.118204 systemd[1]: Started systemd-logind.service. Dec 13 02:05:49.130077 update-ssh-keys[1258]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:05:49.130671 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:05:49.165980 env[1218]: time="2024-12-13T02:05:49.165886377Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:05:49.166329 env[1218]: time="2024-12-13T02:05:49.166302431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.176817926Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.176874962Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.177224991Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.177255206Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.177278236Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.177297562Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.177420304Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.177810894Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.178049122Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:05:49.178126 env[1218]: time="2024-12-13T02:05:49.178079471Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:05:49.178665 env[1218]: time="2024-12-13T02:05:49.178171999Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:05:49.178665 env[1218]: time="2024-12-13T02:05:49.178191364Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195613516Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195719061Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195773289Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195857752Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195885007Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195970939Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.195998447Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196042790Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196067192Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196117760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196141128Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196164283Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196430852Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:05:49.198535 env[1218]: time="2024-12-13T02:05:49.196647403Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197142289Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197191957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197215807Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197290442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197314660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197339088Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197363959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197387983Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197407789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197426090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197446866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197471157Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197675859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197700632Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.199324 env[1218]: time="2024-12-13T02:05:49.197726558Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.200042 env[1218]: time="2024-12-13T02:05:49.197746528Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:05:49.200042 env[1218]: time="2024-12-13T02:05:49.197781896Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:05:49.200042 env[1218]: time="2024-12-13T02:05:49.197803385Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:05:49.200042 env[1218]: time="2024-12-13T02:05:49.197846076Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:05:49.200042 env[1218]: time="2024-12-13T02:05:49.197902837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:05:49.200295 env[1218]: time="2024-12-13T02:05:49.198227689Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:05:49.200295 env[1218]: time="2024-12-13T02:05:49.198323418Z" level=info msg="Connect containerd service" Dec 13 02:05:49.200295 env[1218]: time="2024-12-13T02:05:49.198388533Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:05:49.211941 env[1218]: time="2024-12-13T02:05:49.211531261Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:05:49.211941 env[1218]: time="2024-12-13T02:05:49.211928370Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:05:49.212534 env[1218]: time="2024-12-13T02:05:49.212017021Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:05:49.212534 env[1218]: time="2024-12-13T02:05:49.212096118Z" level=info msg="containerd successfully booted in 0.278690s" Dec 13 02:05:49.212187 systemd[1]: Started containerd.service. Dec 13 02:05:49.213979 env[1218]: time="2024-12-13T02:05:49.212717606Z" level=info msg="Start subscribing containerd event" Dec 13 02:05:49.213979 env[1218]: time="2024-12-13T02:05:49.212795354Z" level=info msg="Start recovering state" Dec 13 02:05:49.213979 env[1218]: time="2024-12-13T02:05:49.212885749Z" level=info msg="Start event monitor" Dec 13 02:05:49.213979 env[1218]: time="2024-12-13T02:05:49.212907984Z" level=info msg="Start snapshots syncer" Dec 13 02:05:49.213979 env[1218]: time="2024-12-13T02:05:49.212924256Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:05:49.213979 env[1218]: time="2024-12-13T02:05:49.212939690Z" level=info msg="Start streaming server" Dec 13 02:05:49.236016 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:05:49.236235 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:05:49.237279 dbus-daemon[1186]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1237 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:05:49.248566 systemd[1]: Starting polkit.service... Dec 13 02:05:49.333395 polkitd[1262]: Started polkitd version 121 Dec 13 02:05:49.367785 polkitd[1262]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:05:49.368082 polkitd[1262]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:05:49.371320 polkitd[1262]: Finished loading, compiling and executing 2 rules Dec 13 02:05:49.372188 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:05:49.372412 systemd[1]: Started polkit.service. Dec 13 02:05:49.375015 polkitd[1262]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:05:49.426580 systemd-hostnamed[1237]: Hostname set to (transient) Dec 13 02:05:49.430465 systemd-resolved[1153]: System hostname changed to 'ci-3510-3-6-8505e9f9a958c93191e5.c.flatcar-212911.internal'. Dec 13 02:05:49.854000 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:05:49.927921 systemd[1]: Finished sshd-keygen.service. Dec 13 02:05:49.938752 systemd[1]: Starting issuegen.service... Dec 13 02:05:49.953060 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:05:49.953339 systemd[1]: Finished issuegen.service. Dec 13 02:05:49.964505 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:05:49.983384 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:05:49.995428 systemd[1]: Started getty@tty1.service. Dec 13 02:05:50.006463 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:05:50.014753 systemd[1]: Reached target getty.target. Dec 13 02:05:50.134620 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:05:50.680096 systemd[1]: Started kubelet.service. Dec 13 02:05:51.839244 kubelet[1288]: E1213 02:05:51.839162 1288 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:05:51.842057 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:05:51.842263 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:05:51.842675 systemd[1]: kubelet.service: Consumed 1.437s CPU time. Dec 13 02:05:53.802234 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 02:05:56.071562 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:05:56.102279 systemd-nspawn[1295]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 02:05:56.102279 systemd-nspawn[1295]: Press ^] three times within 1s to kill container. Dec 13 02:05:56.119533 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:05:56.197108 systemd[1]: Started oem-gce.service. Dec 13 02:05:56.197615 systemd[1]: Reached target multi-user.target. Dec 13 02:05:56.199974 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:05:56.211318 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:05:56.211572 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:05:56.211832 systemd[1]: Startup finished in 1.051s (kernel) + 7.330s (initrd) + 15.504s (userspace) = 23.886s. Dec 13 02:05:56.258006 systemd-nspawn[1295]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 02:05:56.258006 systemd-nspawn[1295]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 02:05:56.258293 systemd-nspawn[1295]: + /usr/bin/google_instance_setup Dec 13 02:05:56.881334 instance-setup[1301]: INFO Running google_set_multiqueue. Dec 13 02:05:56.899083 instance-setup[1301]: INFO Set channels for eth0 to 2. Dec 13 02:05:56.902803 instance-setup[1301]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 02:05:56.904207 instance-setup[1301]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 02:05:56.904720 instance-setup[1301]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 02:05:56.905962 instance-setup[1301]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 02:05:56.906356 instance-setup[1301]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 02:05:56.907728 instance-setup[1301]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 02:05:56.908147 instance-setup[1301]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 02:05:56.909542 instance-setup[1301]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 02:05:56.921435 instance-setup[1301]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 02:05:56.921760 instance-setup[1301]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 02:05:56.964430 systemd-nspawn[1295]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 02:05:57.301370 startup-script[1332]: INFO Starting startup scripts. Dec 13 02:05:57.314756 startup-script[1332]: INFO No startup scripts found in metadata. Dec 13 02:05:57.314917 startup-script[1332]: INFO Finished running startup scripts. Dec 13 02:05:57.348799 systemd-nspawn[1295]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 02:05:57.348799 systemd-nspawn[1295]: + daemon_pids=() Dec 13 02:05:57.349428 systemd-nspawn[1295]: + for d in accounts clock_skew network Dec 13 02:05:57.349428 systemd-nspawn[1295]: + daemon_pids+=($!) Dec 13 02:05:57.349428 systemd-nspawn[1295]: + for d in accounts clock_skew network Dec 13 02:05:57.349684 systemd-nspawn[1295]: + daemon_pids+=($!) Dec 13 02:05:57.349808 systemd-nspawn[1295]: + for d in accounts clock_skew network Dec 13 02:05:57.350128 systemd-nspawn[1295]: + daemon_pids+=($!) Dec 13 02:05:57.350280 systemd-nspawn[1295]: + /usr/bin/google_clock_skew_daemon Dec 13 02:05:57.350349 systemd-nspawn[1295]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 02:05:57.350404 systemd-nspawn[1295]: + /usr/bin/systemd-notify --ready Dec 13 02:05:57.350955 systemd-nspawn[1295]: + /usr/bin/google_network_daemon Dec 13 02:05:57.351113 systemd-nspawn[1295]: + /usr/bin/google_accounts_daemon Dec 13 02:05:57.410218 systemd-nspawn[1295]: + wait -n 36 37 38 Dec 13 02:05:57.435590 systemd[1]: Created slice system-sshd.slice. Dec 13 02:05:57.438809 systemd[1]: Started sshd@0-10.128.0.61:22-139.178.68.195:35300.service. Dec 13 02:05:57.775511 sshd[1340]: Accepted publickey for core from 139.178.68.195 port 35300 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:57.778641 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:57.797018 systemd[1]: Created slice user-500.slice. Dec 13 02:05:57.799091 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:05:57.817819 systemd-logind[1227]: New session 1 of user core. Dec 13 02:05:57.826470 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:05:57.832129 systemd[1]: Starting user@500.service... Dec 13 02:05:57.851383 (systemd)[1343]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:58.077142 systemd[1343]: Queued start job for default target default.target. Dec 13 02:05:58.078049 systemd[1343]: Reached target paths.target. Dec 13 02:05:58.078083 systemd[1343]: Reached target sockets.target. Dec 13 02:05:58.078105 systemd[1343]: Reached target timers.target. Dec 13 02:05:58.078126 systemd[1343]: Reached target basic.target. Dec 13 02:05:58.078211 systemd[1343]: Reached target default.target. Dec 13 02:05:58.078283 systemd[1343]: Startup finished in 210ms. Dec 13 02:05:58.078307 systemd[1]: Started user@500.service. Dec 13 02:05:58.080079 systemd[1]: Started session-1.scope. Dec 13 02:05:58.179697 google-clock-skew[1336]: INFO Starting Google Clock Skew daemon. Dec 13 02:05:58.214076 google-clock-skew[1336]: INFO Clock drift token has changed: 0. Dec 13 02:05:58.225863 systemd-nspawn[1295]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 02:05:58.226261 systemd-nspawn[1295]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 02:05:58.227441 google-clock-skew[1336]: WARNING Failed to sync system time with hardware clock. Dec 13 02:05:58.248888 google-networking[1337]: INFO Starting Google Networking daemon. Dec 13 02:05:58.314932 systemd[1]: Started sshd@1-10.128.0.61:22-139.178.68.195:35314.service. Dec 13 02:05:58.364277 groupadd[1362]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 02:05:58.368063 groupadd[1362]: group added to /etc/gshadow: name=google-sudoers Dec 13 02:05:58.371980 groupadd[1362]: new group: name=google-sudoers, GID=1000 Dec 13 02:05:58.385099 google-accounts[1335]: INFO Starting Google Accounts daemon. Dec 13 02:05:58.410723 google-accounts[1335]: WARNING OS Login not installed. Dec 13 02:05:58.412557 google-accounts[1335]: INFO Creating a new user account for 0. Dec 13 02:05:58.417805 systemd-nspawn[1295]: useradd: invalid user name '0': use --badname to ignore Dec 13 02:05:58.418601 google-accounts[1335]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 02:05:58.620155 sshd[1360]: Accepted publickey for core from 139.178.68.195 port 35314 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:58.621716 sshd[1360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:58.627968 systemd-logind[1227]: New session 2 of user core. Dec 13 02:05:58.628686 systemd[1]: Started session-2.scope. Dec 13 02:05:58.834786 sshd[1360]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:58.839931 systemd[1]: sshd@1-10.128.0.61:22-139.178.68.195:35314.service: Deactivated successfully. Dec 13 02:05:58.840984 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:05:58.841918 systemd-logind[1227]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:05:58.843343 systemd-logind[1227]: Removed session 2. Dec 13 02:05:58.880351 systemd[1]: Started sshd@2-10.128.0.61:22-139.178.68.195:35322.service. Dec 13 02:05:59.165661 sshd[1376]: Accepted publickey for core from 139.178.68.195 port 35322 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:59.167359 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:59.173553 systemd-logind[1227]: New session 3 of user core. Dec 13 02:05:59.174292 systemd[1]: Started session-3.scope. Dec 13 02:05:59.372196 sshd[1376]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:59.376397 systemd[1]: sshd@2-10.128.0.61:22-139.178.68.195:35322.service: Deactivated successfully. Dec 13 02:05:59.377425 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:05:59.378326 systemd-logind[1227]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:05:59.379759 systemd-logind[1227]: Removed session 3. Dec 13 02:05:59.419375 systemd[1]: Started sshd@3-10.128.0.61:22-139.178.68.195:35334.service. Dec 13 02:05:59.709615 sshd[1382]: Accepted publickey for core from 139.178.68.195 port 35334 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:05:59.711321 sshd[1382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:59.717563 systemd-logind[1227]: New session 4 of user core. Dec 13 02:05:59.718295 systemd[1]: Started session-4.scope. Dec 13 02:05:59.926425 sshd[1382]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:59.930769 systemd[1]: sshd@3-10.128.0.61:22-139.178.68.195:35334.service: Deactivated successfully. Dec 13 02:05:59.931895 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:05:59.932893 systemd-logind[1227]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:05:59.934229 systemd-logind[1227]: Removed session 4. Dec 13 02:05:59.972572 systemd[1]: Started sshd@4-10.128.0.61:22-139.178.68.195:35336.service. Dec 13 02:06:00.259254 sshd[1388]: Accepted publickey for core from 139.178.68.195 port 35336 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:00.261131 sshd[1388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:00.267795 systemd[1]: Started session-5.scope. Dec 13 02:06:00.268419 systemd-logind[1227]: New session 5 of user core. Dec 13 02:06:00.454695 sudo[1391]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:06:00.455144 sudo[1391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:00.464768 dbus-daemon[1186]: \xd0\xfd\xee\xd7.V: received setenforce notice (enforcing=1859209760) Dec 13 02:06:00.467067 sudo[1391]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:00.511851 sshd[1388]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:00.516813 systemd[1]: sshd@4-10.128.0.61:22-139.178.68.195:35336.service: Deactivated successfully. Dec 13 02:06:00.518033 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:06:00.519100 systemd-logind[1227]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:06:00.520462 systemd-logind[1227]: Removed session 5. Dec 13 02:06:00.558379 systemd[1]: Started sshd@5-10.128.0.61:22-139.178.68.195:35346.service. Dec 13 02:06:00.848327 sshd[1395]: Accepted publickey for core from 139.178.68.195 port 35346 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:00.849961 sshd[1395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:00.856259 systemd-logind[1227]: New session 6 of user core. Dec 13 02:06:00.857039 systemd[1]: Started session-6.scope. Dec 13 02:06:01.027629 sudo[1399]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:06:01.028190 sudo[1399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:01.032363 sudo[1399]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:01.044657 sudo[1398]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:06:01.045081 sudo[1398]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:01.057900 systemd[1]: Stopping audit-rules.service... Dec 13 02:06:01.059000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:06:01.065286 kernel: kauditd_printk_skb: 211 callbacks suppressed Dec 13 02:06:01.065401 kernel: audit: type=1305 audit(1734055561.059:190): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:06:01.065444 auditctl[1402]: No rules Dec 13 02:06:01.066514 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:06:01.066799 systemd[1]: Stopped audit-rules.service. Dec 13 02:06:01.059000 audit[1402]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7ba82c20 a2=420 a3=0 items=0 ppid=1 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.082147 systemd[1]: Starting audit-rules.service... Dec 13 02:06:01.110863 kernel: audit: type=1300 audit(1734055561.059:190): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7ba82c20 a2=420 a3=0 items=0 ppid=1 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.111064 kernel: audit: type=1327 audit(1734055561.059:190): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:06:01.059000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:06:01.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.141935 kernel: audit: type=1131 audit(1734055561.064:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.148060 augenrules[1419]: No rules Dec 13 02:06:01.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.150356 sudo[1398]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:01.148869 systemd[1]: Finished audit-rules.service. Dec 13 02:06:01.171528 kernel: audit: type=1130 audit(1734055561.148:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.171690 kernel: audit: type=1106 audit(1734055561.148:193): pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.148000 audit[1398]: USER_END pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.148000 audit[1398]: CRED_DISP pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.198016 sshd[1395]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:01.204398 systemd[1]: sshd@5-10.128.0.61:22-139.178.68.195:35346.service: Deactivated successfully. Dec 13 02:06:01.205579 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:06:01.207509 systemd-logind[1227]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:06:01.209219 systemd-logind[1227]: Removed session 6. Dec 13 02:06:01.219187 kernel: audit: type=1104 audit(1734055561.148:194): pid=1398 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.219363 kernel: audit: type=1106 audit(1734055561.200:195): pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.200000 audit[1395]: USER_END pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.275735 kernel: audit: type=1104 audit(1734055561.200:196): pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.200000 audit[1395]: CRED_DISP pid=1395 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.258816 systemd[1]: Started sshd@6-10.128.0.61:22-139.178.68.195:35354.service. Dec 13 02:06:01.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.61:22-139.178.68.195:35346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.61:22-139.178.68.195:35354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.302605 kernel: audit: type=1131 audit(1734055561.204:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.61:22-139.178.68.195:35346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.549000 audit[1425]: USER_ACCT pid=1425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.550620 sshd[1425]: Accepted publickey for core from 139.178.68.195 port 35354 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:01.551000 audit[1425]: CRED_ACQ pid=1425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.551000 audit[1425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbfa64940 a2=3 a3=0 items=0 ppid=1 pid=1425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:01.552788 sshd[1425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:01.559759 systemd[1]: Started session-7.scope. Dec 13 02:06:01.560381 systemd-logind[1227]: New session 7 of user core. Dec 13 02:06:01.567000 audit[1425]: USER_START pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.569000 audit[1427]: CRED_ACQ pid=1427 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:01.727000 audit[1428]: USER_ACCT pid=1428 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.728275 sudo[1428]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:06:01.727000 audit[1428]: CRED_REFR pid=1428 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.728750 sudo[1428]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:06:01.730000 audit[1428]: USER_START pid=1428 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:01.747312 systemd[1]: Starting coreos-metadata.service... Dec 13 02:06:01.797628 coreos-metadata[1432]: Dec 13 02:06:01.797 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Dec 13 02:06:01.799244 coreos-metadata[1432]: Dec 13 02:06:01.799 INFO Fetch successful Dec 13 02:06:01.799394 coreos-metadata[1432]: Dec 13 02:06:01.799 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Dec 13 02:06:01.800151 coreos-metadata[1432]: Dec 13 02:06:01.800 INFO Fetch successful Dec 13 02:06:01.800243 coreos-metadata[1432]: Dec 13 02:06:01.800 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Dec 13 02:06:01.801012 coreos-metadata[1432]: Dec 13 02:06:01.800 INFO Fetch successful Dec 13 02:06:01.801388 coreos-metadata[1432]: Dec 13 02:06:01.801 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Dec 13 02:06:01.802545 coreos-metadata[1432]: Dec 13 02:06:01.802 INFO Fetch successful Dec 13 02:06:01.812423 systemd[1]: Finished coreos-metadata.service. Dec 13 02:06:01.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:02.011796 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:06:02.012162 systemd[1]: Stopped kubelet.service. Dec 13 02:06:02.012261 systemd[1]: kubelet.service: Consumed 1.437s CPU time. Dec 13 02:06:02.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:02.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:02.014851 systemd[1]: Starting kubelet.service... Dec 13 02:06:02.275744 systemd[1]: Started kubelet.service. Dec 13 02:06:02.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:02.401259 kubelet[1451]: E1213 02:06:02.401184 1451 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:06:02.406669 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:06:02.406902 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:06:02.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:06:02.864991 systemd[1]: Stopped kubelet.service. Dec 13 02:06:02.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:02.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:02.869188 systemd[1]: Starting kubelet.service... Dec 13 02:06:02.908505 systemd[1]: Reloading. Dec 13 02:06:03.066498 /usr/lib/systemd/system-generators/torcx-generator[1502]: time="2024-12-13T02:06:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:06:03.073057 /usr/lib/systemd/system-generators/torcx-generator[1502]: time="2024-12-13T02:06:03Z" level=info msg="torcx already run" Dec 13 02:06:03.180934 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:06:03.180962 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:06:03.205376 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.300000 audit: BPF prog-id=46 op=LOAD Dec 13 02:06:03.300000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit: BPF prog-id=47 op=LOAD Dec 13 02:06:03.302000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit: BPF prog-id=48 op=LOAD Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.302000 audit: BPF prog-id=49 op=LOAD Dec 13 02:06:03.302000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:06:03.302000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.303000 audit: BPF prog-id=50 op=LOAD Dec 13 02:06:03.303000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit: BPF prog-id=51 op=LOAD Dec 13 02:06:03.332000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit: BPF prog-id=52 op=LOAD Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.333000 audit: BPF prog-id=53 op=LOAD Dec 13 02:06:03.333000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:06:03.333000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit: BPF prog-id=54 op=LOAD Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.334000 audit: BPF prog-id=55 op=LOAD Dec 13 02:06:03.334000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:06:03.334000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.335000 audit: BPF prog-id=56 op=LOAD Dec 13 02:06:03.335000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.337000 audit: BPF prog-id=57 op=LOAD Dec 13 02:06:03.337000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit: BPF prog-id=58 op=LOAD Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.338000 audit: BPF prog-id=59 op=LOAD Dec 13 02:06:03.338000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:06:03.338000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit: BPF prog-id=60 op=LOAD Dec 13 02:06:03.341000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit: BPF prog-id=61 op=LOAD Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.341000 audit: BPF prog-id=62 op=LOAD Dec 13 02:06:03.341000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:06:03.341000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.344000 audit: BPF prog-id=63 op=LOAD Dec 13 02:06:03.344000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:06:03.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:03.364878 systemd[1]: Started kubelet.service. Dec 13 02:06:03.374414 systemd[1]: Stopping kubelet.service... Dec 13 02:06:03.375639 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:06:03.375917 systemd[1]: Stopped kubelet.service. Dec 13 02:06:03.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:03.378338 systemd[1]: Starting kubelet.service... Dec 13 02:06:03.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:03.616518 systemd[1]: Started kubelet.service. Dec 13 02:06:03.682387 kubelet[1558]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:06:03.682387 kubelet[1558]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:06:03.682387 kubelet[1558]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:06:03.683027 kubelet[1558]: I1213 02:06:03.682507 1558 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:06:04.183047 kubelet[1558]: I1213 02:06:04.182996 1558 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 02:06:04.183047 kubelet[1558]: I1213 02:06:04.183033 1558 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:06:04.183376 kubelet[1558]: I1213 02:06:04.183340 1558 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 02:06:04.241579 kubelet[1558]: I1213 02:06:04.241518 1558 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:06:04.256987 kubelet[1558]: I1213 02:06:04.256940 1558 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:06:04.257362 kubelet[1558]: I1213 02:06:04.257325 1558 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:06:04.257656 kubelet[1558]: I1213 02:06:04.257617 1558 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:06:04.258900 kubelet[1558]: I1213 02:06:04.258862 1558 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:06:04.258900 kubelet[1558]: I1213 02:06:04.258905 1558 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:06:04.261740 kubelet[1558]: I1213 02:06:04.261697 1558 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:06:04.261962 kubelet[1558]: I1213 02:06:04.261937 1558 kubelet.go:396] "Attempting to sync node with API server" Dec 13 02:06:04.262045 kubelet[1558]: I1213 02:06:04.261975 1558 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:06:04.262045 kubelet[1558]: I1213 02:06:04.262019 1558 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:06:04.262045 kubelet[1558]: I1213 02:06:04.262037 1558 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:06:04.262657 kubelet[1558]: E1213 02:06:04.262591 1558 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:04.262765 kubelet[1558]: E1213 02:06:04.262668 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:04.264445 kubelet[1558]: I1213 02:06:04.264392 1558 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:06:04.269401 kubelet[1558]: I1213 02:06:04.269354 1558 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:06:04.269573 kubelet[1558]: W1213 02:06:04.269448 1558 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:06:04.270256 kubelet[1558]: I1213 02:06:04.270227 1558 server.go:1256] "Started kubelet" Dec 13 02:06:04.270561 kubelet[1558]: W1213 02:06:04.270522 1558 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.128.0.61" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:06:04.270561 kubelet[1558]: E1213 02:06:04.270563 1558 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.61" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:06:04.270729 kubelet[1558]: W1213 02:06:04.270683 1558 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:06:04.270729 kubelet[1558]: E1213 02:06:04.270705 1558 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:06:04.271018 kubelet[1558]: I1213 02:06:04.270979 1558 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:06:04.272000 audit[1558]: AVC avc: denied { mac_admin } for pid=1558 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:04.272000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:06:04.272000 audit[1558]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009eb950 a1=c0007cff98 a2=c0009eb920 a3=25 items=0 ppid=1 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:06:04.272000 audit[1558]: AVC avc: denied { mac_admin } for pid=1558 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:04.272000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:06:04.272000 audit[1558]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aaa380 a1=c0007cffb0 a2=c0009eb9e0 a3=25 items=0 ppid=1 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:06:04.274530 kubelet[1558]: I1213 02:06:04.273207 1558 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:06:04.274530 kubelet[1558]: I1213 02:06:04.273278 1558 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:06:04.274530 kubelet[1558]: I1213 02:06:04.273371 1558 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:06:04.280682 kubelet[1558]: I1213 02:06:04.280598 1558 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:06:04.281084 kubelet[1558]: I1213 02:06:04.281002 1558 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:06:04.291506 kubelet[1558]: I1213 02:06:04.290139 1558 server.go:461] "Adding debug handlers to kubelet server" Dec 13 02:06:04.295250 kubelet[1558]: I1213 02:06:04.295220 1558 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:06:04.296127 kubelet[1558]: I1213 02:06:04.296092 1558 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 02:06:04.296251 kubelet[1558]: I1213 02:06:04.296184 1558 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 02:06:04.297172 kubelet[1558]: I1213 02:06:04.297125 1558 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:06:04.297292 kubelet[1558]: I1213 02:06:04.297255 1558 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:06:04.299024 kubelet[1558]: E1213 02:06:04.298999 1558 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.61.18109a59291d55ee default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.61,UID:10.128.0.61,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.128.0.61,},FirstTimestamp:2024-12-13 02:06:04.270196206 +0000 UTC m=+0.646182545,LastTimestamp:2024-12-13 02:06:04.270196206 +0000 UTC m=+0.646182545,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.61,}" Dec 13 02:06:04.302137 kubelet[1558]: E1213 02:06:04.302112 1558 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:06:04.308921 kubelet[1558]: I1213 02:06:04.308892 1558 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:06:04.343000 audit[1570]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.343000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9a3411f0 a2=0 a3=7ffd9a3411dc items=0 ppid=1558 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:06:04.345102 kubelet[1558]: E1213 02:06:04.345057 1558 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.61\" not found" node="10.128.0.61" Dec 13 02:06:04.363000 audit[1573]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.363000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff10321e10 a2=0 a3=7fff10321dfc items=0 ppid=1558 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:06:04.365412 kubelet[1558]: I1213 02:06:04.365376 1558 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:06:04.365663 kubelet[1558]: I1213 02:06:04.365643 1558 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:06:04.365844 kubelet[1558]: I1213 02:06:04.365826 1558 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:06:04.368714 kubelet[1558]: I1213 02:06:04.368673 1558 policy_none.go:49] "None policy: Start" Dec 13 02:06:04.369831 kubelet[1558]: I1213 02:06:04.369767 1558 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:06:04.369831 kubelet[1558]: I1213 02:06:04.369827 1558 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:06:04.377748 systemd[1]: Created slice kubepods.slice. Dec 13 02:06:04.386004 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:06:04.369000 audit[1577]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.369000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe090597a0 a2=0 a3=7ffe0905978c items=0 ppid=1558 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:04.392194 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:06:04.397084 kubelet[1558]: I1213 02:06:04.397054 1558 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.61" Dec 13 02:06:04.398000 audit[1582]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.398000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5ef4c960 a2=0 a3=7ffe5ef4c94c items=0 ppid=1558 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:04.400144 kubelet[1558]: I1213 02:06:04.400122 1558 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:06:04.399000 audit[1558]: AVC avc: denied { mac_admin } for pid=1558 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:04.399000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:06:04.399000 audit[1558]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e4fbf0 a1=c000de07c8 a2=c000e4fbc0 a3=25 items=0 ppid=1 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.399000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:06:04.403262 kubelet[1558]: I1213 02:06:04.403239 1558 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:06:04.405727 kubelet[1558]: I1213 02:06:04.405703 1558 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:06:04.408640 kubelet[1558]: E1213 02:06:04.408618 1558 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.61\" not found" Dec 13 02:06:04.409746 kubelet[1558]: I1213 02:06:04.409722 1558 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.61" Dec 13 02:06:04.449608 kubelet[1558]: E1213 02:06:04.445513 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:04.463000 audit[1588]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.463000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe34334790 a2=0 a3=7ffe3433477c items=0 ppid=1558 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:06:04.465207 kubelet[1558]: I1213 02:06:04.465177 1558 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:06:04.466000 audit[1589]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.466000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc43b9360 a2=0 a3=7ffcc43b934c items=0 ppid=1558 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:06:04.467000 audit[1590]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:04.467000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc037ef400 a2=0 a3=7ffc037ef3ec items=0 ppid=1558 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:06:04.468606 kubelet[1558]: I1213 02:06:04.468578 1558 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:06:04.468733 kubelet[1558]: I1213 02:06:04.468620 1558 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:06:04.468733 kubelet[1558]: I1213 02:06:04.468646 1558 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 02:06:04.468733 kubelet[1558]: E1213 02:06:04.468710 1558 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 02:06:04.470000 audit[1591]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.470000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdf1f92b70 a2=0 a3=7ffdf1f92b5c items=0 ppid=1558 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:06:04.471000 audit[1592]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:04.471000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff719e72b0 a2=0 a3=7fff719e729c items=0 ppid=1558 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:06:04.473000 audit[1593]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:04.473000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc60533a30 a2=0 a3=7ffc60533a1c items=0 ppid=1558 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:06:04.473000 audit[1594]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:04.473000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff63779bc0 a2=0 a3=7fff63779bac items=0 ppid=1558 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:06:04.475000 audit[1595]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1595 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:04.475000 audit[1595]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8e119ff0 a2=0 a3=7ffd8e119fdc items=0 ppid=1558 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:06:04.550873 kubelet[1558]: E1213 02:06:04.550827 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:04.651769 kubelet[1558]: E1213 02:06:04.651696 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:04.752760 kubelet[1558]: E1213 02:06:04.752618 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:04.853543 kubelet[1558]: E1213 02:06:04.853461 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:04.954226 kubelet[1558]: E1213 02:06:04.954161 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.054943 kubelet[1558]: E1213 02:06:05.054885 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.138055 sudo[1428]: pam_unix(sudo:session): session closed for user root Dec 13 02:06:05.137000 audit[1428]: USER_END pid=1428 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:05.137000 audit[1428]: CRED_DISP pid=1428 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:06:05.155785 kubelet[1558]: E1213 02:06:05.155669 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.180904 sshd[1425]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:05.182000 audit[1425]: USER_END pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.183000 audit[1425]: CRED_DISP pid=1425 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.185780 systemd[1]: sshd@6-10.128.0.61:22-139.178.68.195:35354.service: Deactivated successfully. Dec 13 02:06:05.186101 kubelet[1558]: I1213 02:06:05.186046 1558 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 02:06:05.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.61:22-139.178.68.195:35354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:05.187032 kubelet[1558]: W1213 02:06:05.187006 1558 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:06:05.187139 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:06:05.187418 kubelet[1558]: W1213 02:06:05.187342 1558 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:06:05.188097 systemd-logind[1227]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:06:05.189392 systemd-logind[1227]: Removed session 7. Dec 13 02:06:05.256829 kubelet[1558]: E1213 02:06:05.256760 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.263032 kubelet[1558]: E1213 02:06:05.262974 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:05.357996 kubelet[1558]: E1213 02:06:05.357855 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.458756 kubelet[1558]: E1213 02:06:05.458702 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.559288 kubelet[1558]: E1213 02:06:05.559236 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.660025 kubelet[1558]: E1213 02:06:05.659888 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.760929 kubelet[1558]: E1213 02:06:05.760869 1558 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.61\" not found" Dec 13 02:06:05.862672 kubelet[1558]: I1213 02:06:05.862629 1558 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 02:06:05.863209 env[1218]: time="2024-12-13T02:06:05.863153456Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:06:05.863799 kubelet[1558]: I1213 02:06:05.863512 1558 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 02:06:06.264106 kubelet[1558]: I1213 02:06:06.264057 1558 apiserver.go:52] "Watching apiserver" Dec 13 02:06:06.264403 kubelet[1558]: E1213 02:06:06.264071 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:06.271883 kubelet[1558]: I1213 02:06:06.271446 1558 topology_manager.go:215] "Topology Admit Handler" podUID="a1d77e39-065a-4cc9-be5c-4abebf9a0e3d" podNamespace="calico-system" podName="calico-node-7xbv4" Dec 13 02:06:06.271883 kubelet[1558]: I1213 02:06:06.271612 1558 topology_manager.go:215] "Topology Admit Handler" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" podNamespace="calico-system" podName="csi-node-driver-x874n" Dec 13 02:06:06.271883 kubelet[1558]: I1213 02:06:06.271682 1558 topology_manager.go:215] "Topology Admit Handler" podUID="584f0c47-3981-443e-a49d-36b7135050d8" podNamespace="kube-system" podName="kube-proxy-b5sxl" Dec 13 02:06:06.272835 kubelet[1558]: E1213 02:06:06.272800 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:06.280821 systemd[1]: Created slice kubepods-besteffort-pod584f0c47_3981_443e_a49d_36b7135050d8.slice. Dec 13 02:06:06.296605 kubelet[1558]: I1213 02:06:06.296546 1558 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 02:06:06.300166 systemd[1]: Created slice kubepods-besteffort-poda1d77e39_065a_4cc9_be5c_4abebf9a0e3d.slice. Dec 13 02:06:06.308678 kubelet[1558]: I1213 02:06:06.308629 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2e26474d-f57f-4a66-bed6-df9a23cb190c-varrun\") pod \"csi-node-driver-x874n\" (UID: \"2e26474d-f57f-4a66-bed6-df9a23cb190c\") " pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:06.308678 kubelet[1558]: I1213 02:06:06.308685 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2e26474d-f57f-4a66-bed6-df9a23cb190c-socket-dir\") pod \"csi-node-driver-x874n\" (UID: \"2e26474d-f57f-4a66-bed6-df9a23cb190c\") " pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:06.308900 kubelet[1558]: I1213 02:06:06.308721 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/584f0c47-3981-443e-a49d-36b7135050d8-kube-proxy\") pod \"kube-proxy-b5sxl\" (UID: \"584f0c47-3981-443e-a49d-36b7135050d8\") " pod="kube-system/kube-proxy-b5sxl" Dec 13 02:06:06.308900 kubelet[1558]: I1213 02:06:06.308750 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/584f0c47-3981-443e-a49d-36b7135050d8-xtables-lock\") pod \"kube-proxy-b5sxl\" (UID: \"584f0c47-3981-443e-a49d-36b7135050d8\") " pod="kube-system/kube-proxy-b5sxl" Dec 13 02:06:06.308900 kubelet[1558]: I1213 02:06:06.308781 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-var-lib-calico\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.308900 kubelet[1558]: I1213 02:06:06.308812 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-cni-log-dir\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.308900 kubelet[1558]: I1213 02:06:06.308860 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-cni-bin-dir\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309140 kubelet[1558]: I1213 02:06:06.308898 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-flexvol-driver-host\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309140 kubelet[1558]: I1213 02:06:06.308935 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fbwg9\" (UniqueName: \"kubernetes.io/projected/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-kube-api-access-fbwg9\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309140 kubelet[1558]: I1213 02:06:06.308972 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njktj\" (UniqueName: \"kubernetes.io/projected/2e26474d-f57f-4a66-bed6-df9a23cb190c-kube-api-access-njktj\") pod \"csi-node-driver-x874n\" (UID: \"2e26474d-f57f-4a66-bed6-df9a23cb190c\") " pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:06.309140 kubelet[1558]: I1213 02:06:06.309008 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mnqpx\" (UniqueName: \"kubernetes.io/projected/584f0c47-3981-443e-a49d-36b7135050d8-kube-api-access-mnqpx\") pod \"kube-proxy-b5sxl\" (UID: \"584f0c47-3981-443e-a49d-36b7135050d8\") " pod="kube-system/kube-proxy-b5sxl" Dec 13 02:06:06.309140 kubelet[1558]: I1213 02:06:06.309041 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-xtables-lock\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309385 kubelet[1558]: I1213 02:06:06.309082 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-tigera-ca-bundle\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309385 kubelet[1558]: I1213 02:06:06.309117 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-cni-net-dir\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309385 kubelet[1558]: I1213 02:06:06.309151 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-policysync\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309385 kubelet[1558]: I1213 02:06:06.309189 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-node-certs\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309385 kubelet[1558]: I1213 02:06:06.309225 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2e26474d-f57f-4a66-bed6-df9a23cb190c-kubelet-dir\") pod \"csi-node-driver-x874n\" (UID: \"2e26474d-f57f-4a66-bed6-df9a23cb190c\") " pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:06.309668 kubelet[1558]: I1213 02:06:06.309276 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2e26474d-f57f-4a66-bed6-df9a23cb190c-registration-dir\") pod \"csi-node-driver-x874n\" (UID: \"2e26474d-f57f-4a66-bed6-df9a23cb190c\") " pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:06.309668 kubelet[1558]: I1213 02:06:06.309312 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/584f0c47-3981-443e-a49d-36b7135050d8-lib-modules\") pod \"kube-proxy-b5sxl\" (UID: \"584f0c47-3981-443e-a49d-36b7135050d8\") " pod="kube-system/kube-proxy-b5sxl" Dec 13 02:06:06.309668 kubelet[1558]: I1213 02:06:06.309358 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-lib-modules\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.309668 kubelet[1558]: I1213 02:06:06.309422 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a1d77e39-065a-4cc9-be5c-4abebf9a0e3d-var-run-calico\") pod \"calico-node-7xbv4\" (UID: \"a1d77e39-065a-4cc9-be5c-4abebf9a0e3d\") " pod="calico-system/calico-node-7xbv4" Dec 13 02:06:06.414796 kubelet[1558]: E1213 02:06:06.414757 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.415033 kubelet[1558]: W1213 02:06:06.415006 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.415216 kubelet[1558]: E1213 02:06:06.415196 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.415803 kubelet[1558]: E1213 02:06:06.415775 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.415996 kubelet[1558]: W1213 02:06:06.415971 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.416153 kubelet[1558]: E1213 02:06:06.416135 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.417390 kubelet[1558]: E1213 02:06:06.417350 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.417603 kubelet[1558]: W1213 02:06:06.417579 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.417757 kubelet[1558]: E1213 02:06:06.417740 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.422277 kubelet[1558]: E1213 02:06:06.422247 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.422538 kubelet[1558]: W1213 02:06:06.422473 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.422706 kubelet[1558]: E1213 02:06:06.422688 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.426013 kubelet[1558]: E1213 02:06:06.425987 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.426195 kubelet[1558]: W1213 02:06:06.426170 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.426347 kubelet[1558]: E1213 02:06:06.426330 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.426952 kubelet[1558]: E1213 02:06:06.426931 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.427109 kubelet[1558]: W1213 02:06:06.427088 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.427399 kubelet[1558]: E1213 02:06:06.427380 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.427844 kubelet[1558]: E1213 02:06:06.427824 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.428005 kubelet[1558]: W1213 02:06:06.427984 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.428278 kubelet[1558]: E1213 02:06:06.428260 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.428692 kubelet[1558]: E1213 02:06:06.428673 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.428839 kubelet[1558]: W1213 02:06:06.428819 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.429144 kubelet[1558]: E1213 02:06:06.429126 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.429562 kubelet[1558]: E1213 02:06:06.429542 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.429712 kubelet[1558]: W1213 02:06:06.429693 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.429962 kubelet[1558]: E1213 02:06:06.429945 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.430620 kubelet[1558]: E1213 02:06:06.430601 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.430761 kubelet[1558]: W1213 02:06:06.430743 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.430876 kubelet[1558]: E1213 02:06:06.430861 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.431330 kubelet[1558]: E1213 02:06:06.431310 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.431549 kubelet[1558]: W1213 02:06:06.431457 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.431684 kubelet[1558]: E1213 02:06:06.431665 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.433926 kubelet[1558]: E1213 02:06:06.433904 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.434067 kubelet[1558]: W1213 02:06:06.434048 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.434201 kubelet[1558]: E1213 02:06:06.434186 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.451924 kubelet[1558]: E1213 02:06:06.451897 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.454626 kubelet[1558]: W1213 02:06:06.454589 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.454853 kubelet[1558]: E1213 02:06:06.454831 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.456251 kubelet[1558]: E1213 02:06:06.456226 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:06.456251 kubelet[1558]: W1213 02:06:06.456246 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:06.456404 kubelet[1558]: E1213 02:06:06.456271 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:06.598337 env[1218]: time="2024-12-13T02:06:06.598190125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b5sxl,Uid:584f0c47-3981-443e-a49d-36b7135050d8,Namespace:kube-system,Attempt:0,}" Dec 13 02:06:06.604371 env[1218]: time="2024-12-13T02:06:06.604248035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7xbv4,Uid:a1d77e39-065a-4cc9-be5c-4abebf9a0e3d,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:07.170764 env[1218]: time="2024-12-13T02:06:07.170699032Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.172579 env[1218]: time="2024-12-13T02:06:07.172522064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.175305 env[1218]: time="2024-12-13T02:06:07.175260266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.178393 env[1218]: time="2024-12-13T02:06:07.178331191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.179709 env[1218]: time="2024-12-13T02:06:07.179660832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.180614 env[1218]: time="2024-12-13T02:06:07.180579025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.183008 env[1218]: time="2024-12-13T02:06:07.182956513Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.183913 env[1218]: time="2024-12-13T02:06:07.183873593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.217807036Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.217875049Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.217893666Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.218081837Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/07e70de2b09be453fe294b31552bcc602dfc26a0f56ad8b9643fe870bf7f23a2 pid=1631 runtime=io.containerd.runc.v2 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.217557443Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.217646079Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.217669825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:07.219504 env[1218]: time="2024-12-13T02:06:07.218033168Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6 pid=1630 runtime=io.containerd.runc.v2 Dec 13 02:06:07.241974 systemd[1]: Started cri-containerd-26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6.scope. Dec 13 02:06:07.251691 systemd[1]: Started cri-containerd-07e70de2b09be453fe294b31552bcc602dfc26a0f56ad8b9643fe870bf7f23a2.scope. Dec 13 02:06:07.265390 kubelet[1558]: E1213 02:06:07.265341 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.289885 kernel: kauditd_printk_skb: 280 callbacks suppressed Dec 13 02:06:07.290013 kernel: audit: type=1400 audit(1734055567.282:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.330864 kernel: audit: type=1400 audit(1734055567.282:444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.331021 kernel: audit: type=1400 audit(1734055567.282:445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.379494 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:06:07.379657 kernel: audit: type=1400 audit(1734055567.282:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.379696 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.408548 kernel: audit: type=1400 audit(1734055567.282:447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.408688 kernel: audit: backlog limit exceeded Dec 13 02:06:07.408735 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:06:07.408765 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.433335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount962260961.mount: Deactivated successfully. Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.283000 audit: BPF prog-id=64 op=LOAD Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1631 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653730646532623039626534353366653239346233313535326263 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1631 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653730646532623039626534353366653239346233313535326263 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.291000 audit: BPF prog-id=65 op=LOAD Dec 13 02:06:07.291000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219100 items=0 ppid=1631 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653730646532623039626534353366653239346233313535326263 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit: BPF prog-id=66 op=LOAD Dec 13 02:06:07.351000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219148 items=0 ppid=1631 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653730646532623039626534353366653239346233313535326263 Dec 13 02:06:07.351000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:06:07.351000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.351000 audit: BPF prog-id=67 op=LOAD Dec 13 02:06:07.351000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219558 items=0 ppid=1631 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653730646532623039626534353366653239346233313535326263 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.416000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.416000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00023f240 items=0 ppid=1630 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383135373935653138643630656339653637393334666163626139 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.444000 audit: BPF prog-id=70 op=LOAD Dec 13 02:06:07.444000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00023f288 items=0 ppid=1630 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383135373935653138643630656339653637393334666163626139 Dec 13 02:06:07.446000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:06:07.446000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:07.447000 audit: BPF prog-id=71 op=LOAD Dec 13 02:06:07.447000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00023f698 items=0 ppid=1630 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:07.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383135373935653138643630656339653637393334666163626139 Dec 13 02:06:07.465025 env[1218]: time="2024-12-13T02:06:07.464976172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b5sxl,Uid:584f0c47-3981-443e-a49d-36b7135050d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"07e70de2b09be453fe294b31552bcc602dfc26a0f56ad8b9643fe870bf7f23a2\"" Dec 13 02:06:07.469225 env[1218]: time="2024-12-13T02:06:07.469182837Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 02:06:07.481651 env[1218]: time="2024-12-13T02:06:07.481565150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7xbv4,Uid:a1d77e39-065a-4cc9-be5c-4abebf9a0e3d,Namespace:calico-system,Attempt:0,} returns sandbox id \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\"" Dec 13 02:06:08.266318 kubelet[1558]: E1213 02:06:08.266225 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:08.471507 kubelet[1558]: E1213 02:06:08.470124 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:08.625563 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1387897557.mount: Deactivated successfully. Dec 13 02:06:09.267312 kubelet[1558]: E1213 02:06:09.267208 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:09.312081 env[1218]: time="2024-12-13T02:06:09.311996996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:09.314509 env[1218]: time="2024-12-13T02:06:09.314446907Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:09.316538 env[1218]: time="2024-12-13T02:06:09.316471878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:09.318238 env[1218]: time="2024-12-13T02:06:09.318198535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:09.318939 env[1218]: time="2024-12-13T02:06:09.318887689Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 02:06:09.320873 env[1218]: time="2024-12-13T02:06:09.320820542Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:06:09.322831 env[1218]: time="2024-12-13T02:06:09.322783030Z" level=info msg="CreateContainer within sandbox \"07e70de2b09be453fe294b31552bcc602dfc26a0f56ad8b9643fe870bf7f23a2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:06:09.341721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount76540572.mount: Deactivated successfully. Dec 13 02:06:09.350960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1027849746.mount: Deactivated successfully. Dec 13 02:06:09.358827 env[1218]: time="2024-12-13T02:06:09.358769554Z" level=info msg="CreateContainer within sandbox \"07e70de2b09be453fe294b31552bcc602dfc26a0f56ad8b9643fe870bf7f23a2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cbd1c1984e71a17ded72cadd24658796f03ac8d4e58163e8953d707ece334ce1\"" Dec 13 02:06:09.360117 env[1218]: time="2024-12-13T02:06:09.360074495Z" level=info msg="StartContainer for \"cbd1c1984e71a17ded72cadd24658796f03ac8d4e58163e8953d707ece334ce1\"" Dec 13 02:06:09.387245 systemd[1]: Started cri-containerd-cbd1c1984e71a17ded72cadd24658796f03ac8d4e58163e8953d707ece334ce1.scope. Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f087cf59618 items=0 ppid=1631 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643163313938346537316131376465643732636164643234363538 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit: BPF prog-id=72 op=LOAD Dec 13 02:06:09.411000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00037e928 items=0 ppid=1631 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643163313938346537316131376465643732636164643234363538 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit: BPF prog-id=73 op=LOAD Dec 13 02:06:09.411000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00037e978 items=0 ppid=1631 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643163313938346537316131376465643732636164643234363538 Dec 13 02:06:09.411000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:06:09.411000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:09.411000 audit: BPF prog-id=74 op=LOAD Dec 13 02:06:09.411000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00037ea08 items=0 ppid=1631 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643163313938346537316131376465643732636164643234363538 Dec 13 02:06:09.432439 env[1218]: time="2024-12-13T02:06:09.432386071Z" level=info msg="StartContainer for \"cbd1c1984e71a17ded72cadd24658796f03ac8d4e58163e8953d707ece334ce1\" returns successfully" Dec 13 02:06:09.512835 kubelet[1558]: I1213 02:06:09.512775 1558 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-b5sxl" podStartSLOduration=3.660731091 podStartE2EDuration="5.512699936s" podCreationTimestamp="2024-12-13 02:06:04 +0000 UTC" firstStartedPulling="2024-12-13 02:06:07.467672943 +0000 UTC m=+3.843659267" lastFinishedPulling="2024-12-13 02:06:09.319641786 +0000 UTC m=+5.695628112" observedRunningTime="2024-12-13 02:06:09.510539169 +0000 UTC m=+5.886525506" watchObservedRunningTime="2024-12-13 02:06:09.512699936 +0000 UTC m=+5.888686272" Dec 13 02:06:09.525321 kubelet[1558]: E1213 02:06:09.525182 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.525321 kubelet[1558]: W1213 02:06:09.525224 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.525321 kubelet[1558]: E1213 02:06:09.525267 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.526675 kubelet[1558]: E1213 02:06:09.525713 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.526675 kubelet[1558]: W1213 02:06:09.525732 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.526675 kubelet[1558]: E1213 02:06:09.525774 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.528268 kubelet[1558]: E1213 02:06:09.528238 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.528372 kubelet[1558]: W1213 02:06:09.528278 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.528372 kubelet[1558]: E1213 02:06:09.528302 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.528652 kubelet[1558]: E1213 02:06:09.528628 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.528652 kubelet[1558]: W1213 02:06:09.528649 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.528798 kubelet[1558]: E1213 02:06:09.528670 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.528977 kubelet[1558]: E1213 02:06:09.528955 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.528977 kubelet[1558]: W1213 02:06:09.528975 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.529149 kubelet[1558]: E1213 02:06:09.528994 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.529303 kubelet[1558]: E1213 02:06:09.529265 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.529303 kubelet[1558]: W1213 02:06:09.529294 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.529448 kubelet[1558]: E1213 02:06:09.529313 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.529618 kubelet[1558]: E1213 02:06:09.529596 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.529618 kubelet[1558]: W1213 02:06:09.529615 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.529740 kubelet[1558]: E1213 02:06:09.529634 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.529990 kubelet[1558]: E1213 02:06:09.529967 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.529990 kubelet[1558]: W1213 02:06:09.529987 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.530136 kubelet[1558]: E1213 02:06:09.530007 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.530315 kubelet[1558]: E1213 02:06:09.530294 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.530315 kubelet[1558]: W1213 02:06:09.530313 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.530449 kubelet[1558]: E1213 02:06:09.530335 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.530649 kubelet[1558]: E1213 02:06:09.530629 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.530649 kubelet[1558]: W1213 02:06:09.530648 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.530786 kubelet[1558]: E1213 02:06:09.530667 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.530944 kubelet[1558]: E1213 02:06:09.530924 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.530944 kubelet[1558]: W1213 02:06:09.530944 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.531096 kubelet[1558]: E1213 02:06:09.530966 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.531255 kubelet[1558]: E1213 02:06:09.531234 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.531255 kubelet[1558]: W1213 02:06:09.531254 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.531381 kubelet[1558]: E1213 02:06:09.531283 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.531754 kubelet[1558]: E1213 02:06:09.531587 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.531754 kubelet[1558]: W1213 02:06:09.531604 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.531754 kubelet[1558]: E1213 02:06:09.531623 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.531951 kubelet[1558]: E1213 02:06:09.531875 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.531951 kubelet[1558]: W1213 02:06:09.531886 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.531951 kubelet[1558]: E1213 02:06:09.531905 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.532281 kubelet[1558]: E1213 02:06:09.532179 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.532281 kubelet[1558]: W1213 02:06:09.532194 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.532281 kubelet[1558]: E1213 02:06:09.532216 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.532513 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.533949 kubelet[1558]: W1213 02:06:09.532528 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.532549 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.532822 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.533949 kubelet[1558]: W1213 02:06:09.532836 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.532855 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.533125 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.533949 kubelet[1558]: W1213 02:06:09.533138 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.533155 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.533949 kubelet[1558]: E1213 02:06:09.533425 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.534440 kubelet[1558]: W1213 02:06:09.533436 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.534440 kubelet[1558]: E1213 02:06:09.533454 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.534440 kubelet[1558]: E1213 02:06:09.533771 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.534440 kubelet[1558]: W1213 02:06:09.533783 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.534440 kubelet[1558]: E1213 02:06:09.533802 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.535000 audit[1781]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.535000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc823245a0 a2=0 a3=7ffc8232458c items=0 ppid=1721 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:06:09.538000 audit[1782]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.538000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff49776460 a2=0 a3=7fff4977644c items=0 ppid=1721 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:06:09.538000 audit[1783]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.538000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3db88bd0 a2=0 a3=7fff3db88bbc items=0 ppid=1721 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:06:09.540000 audit[1784]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.540000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc77454cb0 a2=0 a3=7ffc77454c9c items=0 ppid=1721 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:06:09.541000 audit[1785]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.541000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd40e36f30 a2=0 a3=7ffd40e36f1c items=0 ppid=1721 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:06:09.543000 audit[1786]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.543000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe10a71d10 a2=0 a3=7ffe10a71cfc items=0 ppid=1721 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:06:09.546247 kubelet[1558]: E1213 02:06:09.546219 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.546247 kubelet[1558]: W1213 02:06:09.546245 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.546405 kubelet[1558]: E1213 02:06:09.546282 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.546739 kubelet[1558]: E1213 02:06:09.546718 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.546739 kubelet[1558]: W1213 02:06:09.546736 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.546895 kubelet[1558]: E1213 02:06:09.546765 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.547213 kubelet[1558]: E1213 02:06:09.547193 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.547213 kubelet[1558]: W1213 02:06:09.547211 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.547347 kubelet[1558]: E1213 02:06:09.547241 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.547662 kubelet[1558]: E1213 02:06:09.547643 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.547662 kubelet[1558]: W1213 02:06:09.547660 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.547792 kubelet[1558]: E1213 02:06:09.547685 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.548102 kubelet[1558]: E1213 02:06:09.548061 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.548102 kubelet[1558]: W1213 02:06:09.548078 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.548333 kubelet[1558]: E1213 02:06:09.548282 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.548405 kubelet[1558]: E1213 02:06:09.548380 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.548405 kubelet[1558]: W1213 02:06:09.548392 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.548530 kubelet[1558]: E1213 02:06:09.548416 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.548899 kubelet[1558]: E1213 02:06:09.548747 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.548899 kubelet[1558]: W1213 02:06:09.548764 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.548899 kubelet[1558]: E1213 02:06:09.548788 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.549100 kubelet[1558]: E1213 02:06:09.549085 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.549100 kubelet[1558]: W1213 02:06:09.549098 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.549227 kubelet[1558]: E1213 02:06:09.549121 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.549503 kubelet[1558]: E1213 02:06:09.549455 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.549503 kubelet[1558]: W1213 02:06:09.549472 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.549630 kubelet[1558]: E1213 02:06:09.549515 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.550069 kubelet[1558]: E1213 02:06:09.550049 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.550069 kubelet[1558]: W1213 02:06:09.550065 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.550330 kubelet[1558]: E1213 02:06:09.550266 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.550415 kubelet[1558]: E1213 02:06:09.550391 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.550415 kubelet[1558]: W1213 02:06:09.550403 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.550552 kubelet[1558]: E1213 02:06:09.550421 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.551005 kubelet[1558]: E1213 02:06:09.550985 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:06:09.551005 kubelet[1558]: W1213 02:06:09.551002 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:06:09.551137 kubelet[1558]: E1213 02:06:09.551022 1558 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:06:09.638000 audit[1799]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.638000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3a9b95f0 a2=0 a3=7ffd3a9b95dc items=0 ppid=1721 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:06:09.642000 audit[1801]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.642000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3bdae220 a2=0 a3=7ffd3bdae20c items=0 ppid=1721 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:06:09.648000 audit[1804]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.648000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffb00dafc0 a2=0 a3=7fffb00dafac items=0 ppid=1721 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:06:09.651000 audit[1805]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.651000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc50895a0 a2=0 a3=7fffc508958c items=0 ppid=1721 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.651000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:06:09.655000 audit[1807]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.655000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd6462ad0 a2=0 a3=7fffd6462abc items=0 ppid=1721 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:06:09.656000 audit[1808]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.656000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff722aa350 a2=0 a3=7fff722aa33c items=0 ppid=1721 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:06:09.660000 audit[1810]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.660000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe35623a30 a2=0 a3=7ffe35623a1c items=0 ppid=1721 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:06:09.665000 audit[1813]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.665000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd84df6fa0 a2=0 a3=7ffd84df6f8c items=0 ppid=1721 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:06:09.667000 audit[1814]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.667000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff830101f0 a2=0 a3=7fff830101dc items=0 ppid=1721 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:06:09.671000 audit[1816]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.671000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeca182860 a2=0 a3=7ffeca18284c items=0 ppid=1721 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:06:09.673000 audit[1817]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.673000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda19ac900 a2=0 a3=7ffda19ac8ec items=0 ppid=1721 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:06:09.676000 audit[1819]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.676000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff36c088e0 a2=0 a3=7fff36c088cc items=0 ppid=1721 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:06:09.681000 audit[1822]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.681000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffede757400 a2=0 a3=7ffede7573ec items=0 ppid=1721 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:06:09.687000 audit[1825]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.687000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf50d5b80 a2=0 a3=7ffdf50d5b6c items=0 ppid=1721 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:06:09.688000 audit[1826]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.688000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd93b33f50 a2=0 a3=7ffd93b33f3c items=0 ppid=1721 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:06:09.691000 audit[1828]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.691000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffda287e420 a2=0 a3=7ffda287e40c items=0 ppid=1721 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:09.730000 audit[1833]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.730000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1e318c00 a2=0 a3=7ffd1e318bec items=0 ppid=1721 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:09.732000 audit[1834]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.732000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5534bcb0 a2=0 a3=7ffe5534bc9c items=0 ppid=1721 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:06:09.736000 audit[1836]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:06:09.736000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec8734320 a2=0 a3=7ffec873430c items=0 ppid=1721 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:06:09.758000 audit[1843]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:09.758000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff188a8710 a2=0 a3=7fff188a86fc items=0 ppid=1721 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:09.789000 audit[1843]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:09.789000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7fff188a8710 a2=0 a3=7fff188a86fc items=0 ppid=1721 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:09.814000 audit[1851]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.814000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc54ac3260 a2=0 a3=7ffc54ac324c items=0 ppid=1721 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:06:09.819000 audit[1853]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.819000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd1a60a60 a2=0 a3=7ffcd1a60a4c items=0 ppid=1721 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:06:09.824000 audit[1856]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.824000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffef2bec350 a2=0 a3=7ffef2bec33c items=0 ppid=1721 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:06:09.826000 audit[1857]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.826000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe240c7aa0 a2=0 a3=7ffe240c7a8c items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:06:09.830000 audit[1859]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.830000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd73f03c0 a2=0 a3=7ffdd73f03ac items=0 ppid=1721 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:06:09.832000 audit[1860]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.832000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69afeee0 a2=0 a3=7ffd69afeecc items=0 ppid=1721 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:06:09.837000 audit[1862]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.837000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd08ad5dd0 a2=0 a3=7ffd08ad5dbc items=0 ppid=1721 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:06:09.842000 audit[1865]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.842000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd009ec8c0 a2=0 a3=7ffd009ec8ac items=0 ppid=1721 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:06:09.844000 audit[1866]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.844000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0e097fa0 a2=0 a3=7ffc0e097f8c items=0 ppid=1721 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:06:09.848000 audit[1868]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.848000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd25621230 a2=0 a3=7ffd2562121c items=0 ppid=1721 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:06:09.850000 audit[1869]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.850000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6d35be0 a2=0 a3=7ffeb6d35bcc items=0 ppid=1721 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:06:09.853000 audit[1871]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.853000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb70e55e0 a2=0 a3=7ffdb70e55cc items=0 ppid=1721 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:06:09.860000 audit[1874]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.860000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd48c8acd0 a2=0 a3=7ffd48c8acbc items=0 ppid=1721 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:06:09.866000 audit[1877]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.866000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc4a7e500 a2=0 a3=7ffcc4a7e4ec items=0 ppid=1721 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:06:09.868000 audit[1878]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.868000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8264c1d0 a2=0 a3=7fff8264c1bc items=0 ppid=1721 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:06:09.871000 audit[1880]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.871000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcdbe053f0 a2=0 a3=7ffcdbe053dc items=0 ppid=1721 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:09.877000 audit[1883]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.877000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff79b9efd0 a2=0 a3=7fff79b9efbc items=0 ppid=1721 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:06:09.879000 audit[1884]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.879000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebbdbf780 a2=0 a3=7ffebbdbf76c items=0 ppid=1721 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:06:09.882000 audit[1886]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.882000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffefb23280 a2=0 a3=7fffefb2326c items=0 ppid=1721 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:06:09.884000 audit[1887]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.884000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef6975d80 a2=0 a3=7ffef6975d6c items=0 ppid=1721 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:06:09.889000 audit[1889]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.889000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc8ec22c0 a2=0 a3=7ffcc8ec22ac items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:09.895000 audit[1892]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:06:09.895000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9208f050 a2=0 a3=7ffc9208f03c items=0 ppid=1721 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:06:09.900000 audit[1894]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:06:09.900000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffff8f8f280 a2=0 a3=7ffff8f8f26c items=0 ppid=1721 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.900000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:09.901000 audit[1894]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:06:09.901000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffff8f8f280 a2=0 a3=7ffff8f8f26c items=0 ppid=1721 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:09.901000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:10.127788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount136133338.mount: Deactivated successfully. Dec 13 02:06:10.268211 kubelet[1558]: E1213 02:06:10.268161 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:10.292574 env[1218]: time="2024-12-13T02:06:10.292500284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:10.294820 env[1218]: time="2024-12-13T02:06:10.294767676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:10.296736 env[1218]: time="2024-12-13T02:06:10.296691830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:10.298593 env[1218]: time="2024-12-13T02:06:10.298549863Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:10.299344 env[1218]: time="2024-12-13T02:06:10.299298683Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:06:10.302035 env[1218]: time="2024-12-13T02:06:10.301974937Z" level=info msg="CreateContainer within sandbox \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:06:10.325932 env[1218]: time="2024-12-13T02:06:10.325871536Z" level=info msg="CreateContainer within sandbox \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e\"" Dec 13 02:06:10.327265 env[1218]: time="2024-12-13T02:06:10.327220087Z" level=info msg="StartContainer for \"3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e\"" Dec 13 02:06:10.355783 systemd[1]: Started cri-containerd-3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e.scope. Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f25254582f8 items=0 ppid=1630 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:10.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663463383634663639306163623534613330363031623634333762 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit: BPF prog-id=75 op=LOAD Dec 13 02:06:10.379000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024e38 items=0 ppid=1630 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:10.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663463383634663639306163623534613330363031623634333762 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit: BPF prog-id=76 op=LOAD Dec 13 02:06:10.379000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024e88 items=0 ppid=1630 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:10.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663463383634663639306163623534613330363031623634333762 Dec 13 02:06:10.379000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:06:10.379000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:10.379000 audit: BPF prog-id=77 op=LOAD Dec 13 02:06:10.379000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024f18 items=0 ppid=1630 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:10.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663463383634663639306163623534613330363031623634333762 Dec 13 02:06:10.404714 env[1218]: time="2024-12-13T02:06:10.404642218Z" level=info msg="StartContainer for \"3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e\" returns successfully" Dec 13 02:06:10.415633 systemd[1]: cri-containerd-3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e.scope: Deactivated successfully. Dec 13 02:06:10.419000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:06:10.469706 kubelet[1558]: E1213 02:06:10.469604 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:10.625758 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e-rootfs.mount: Deactivated successfully. Dec 13 02:06:10.820439 env[1218]: time="2024-12-13T02:06:10.820347195Z" level=info msg="shim disconnected" id=3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e Dec 13 02:06:10.820439 env[1218]: time="2024-12-13T02:06:10.820409120Z" level=warning msg="cleaning up after shim disconnected" id=3ef4c864f690acb54a30601b6437bd62f3a15bba77708851498f0f46e901da7e namespace=k8s.io Dec 13 02:06:10.820439 env[1218]: time="2024-12-13T02:06:10.820426329Z" level=info msg="cleaning up dead shim" Dec 13 02:06:10.831936 env[1218]: time="2024-12-13T02:06:10.831869619Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1948 runtime=io.containerd.runc.v2\n" Dec 13 02:06:11.268835 kubelet[1558]: E1213 02:06:11.268771 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:11.502050 env[1218]: time="2024-12-13T02:06:11.501996481Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:06:12.269051 kubelet[1558]: E1213 02:06:12.268979 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:12.470842 kubelet[1558]: E1213 02:06:12.469672 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:13.269424 kubelet[1558]: E1213 02:06:13.269343 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:14.269920 kubelet[1558]: E1213 02:06:14.269809 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:14.469698 kubelet[1558]: E1213 02:06:14.469645 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:15.271190 kubelet[1558]: E1213 02:06:15.271107 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:15.657531 env[1218]: time="2024-12-13T02:06:15.657079571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.660455 env[1218]: time="2024-12-13T02:06:15.660406579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.663081 env[1218]: time="2024-12-13T02:06:15.663039922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.665362 env[1218]: time="2024-12-13T02:06:15.665317843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:15.666047 env[1218]: time="2024-12-13T02:06:15.666001477Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:06:15.668855 env[1218]: time="2024-12-13T02:06:15.668800699Z" level=info msg="CreateContainer within sandbox \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:06:15.687290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2083749709.mount: Deactivated successfully. Dec 13 02:06:15.695434 env[1218]: time="2024-12-13T02:06:15.695364284Z" level=info msg="CreateContainer within sandbox \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8\"" Dec 13 02:06:15.696492 env[1218]: time="2024-12-13T02:06:15.696422309Z" level=info msg="StartContainer for \"c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8\"" Dec 13 02:06:15.729069 systemd[1]: Started cri-containerd-c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8.scope. Dec 13 02:06:15.779103 kernel: kauditd_printk_skb: 370 callbacks suppressed Dec 13 02:06:15.780000 kernel: audit: type=1400 audit(1734055575.752:538): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f04280756a8 items=0 ppid=1630 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339313162383365366131633231353332643562313233386365643039 Dec 13 02:06:15.844221 kernel: audit: type=1300 audit(1734055575.752:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f04280756a8 items=0 ppid=1630 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.844327 kernel: audit: type=1327 audit(1734055575.752:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339313162383365366131633231353332643562313233386365643039 Dec 13 02:06:15.844368 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.865645 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.885413 env[1218]: time="2024-12-13T02:06:15.885346863Z" level=info msg="StartContainer for \"c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8\" returns successfully" Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.906773 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.906944 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.949399 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.970506 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.970674 kernel: audit: type=1400 audit(1734055575.752:539): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.752000 audit: BPF prog-id=78 op=LOAD Dec 13 02:06:15.752000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000339bd8 items=0 ppid=1630 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339313162383365366131633231353332643562313233386365643039 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit: BPF prog-id=79 op=LOAD Dec 13 02:06:15.778000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000339c28 items=0 ppid=1630 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339313162383365366131633231353332643562313233386365643039 Dec 13 02:06:15.778000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:06:15.778000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:15.778000 audit: BPF prog-id=80 op=LOAD Dec 13 02:06:15.778000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000339cb8 items=0 ppid=1630 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:15.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339313162383365366131633231353332643562313233386365643039 Dec 13 02:06:16.271934 kubelet[1558]: E1213 02:06:16.271872 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:16.470034 kubelet[1558]: E1213 02:06:16.469986 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:16.739448 env[1218]: time="2024-12-13T02:06:16.739281583Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:06:16.742207 systemd[1]: cri-containerd-c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8.scope: Deactivated successfully. Dec 13 02:06:16.747000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:06:16.771401 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8-rootfs.mount: Deactivated successfully. Dec 13 02:06:16.813245 kubelet[1558]: I1213 02:06:16.813203 1558 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:06:17.272640 kubelet[1558]: E1213 02:06:17.272565 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:17.542853 env[1218]: time="2024-12-13T02:06:17.542515138Z" level=info msg="shim disconnected" id=c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8 Dec 13 02:06:17.542853 env[1218]: time="2024-12-13T02:06:17.542579206Z" level=warning msg="cleaning up after shim disconnected" id=c911b83e6a1c21532d5b1238ced092e9401d181f2796cd697fffbd1aeea102f8 namespace=k8s.io Dec 13 02:06:17.542853 env[1218]: time="2024-12-13T02:06:17.542595999Z" level=info msg="cleaning up dead shim" Dec 13 02:06:17.554925 env[1218]: time="2024-12-13T02:06:17.554828644Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2008 runtime=io.containerd.runc.v2\n" Dec 13 02:06:17.879169 kubelet[1558]: I1213 02:06:17.878730 1558 topology_manager.go:215] "Topology Admit Handler" podUID="b65bb69b-e938-4cf4-917f-41e147ddf684" podNamespace="default" podName="nginx-deployment-6d5f899847-2nnhw" Dec 13 02:06:17.885880 systemd[1]: Created slice kubepods-besteffort-podb65bb69b_e938_4cf4_917f_41e147ddf684.slice. Dec 13 02:06:17.907077 kubelet[1558]: I1213 02:06:17.907018 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6n6mw\" (UniqueName: \"kubernetes.io/projected/b65bb69b-e938-4cf4-917f-41e147ddf684-kube-api-access-6n6mw\") pod \"nginx-deployment-6d5f899847-2nnhw\" (UID: \"b65bb69b-e938-4cf4-917f-41e147ddf684\") " pod="default/nginx-deployment-6d5f899847-2nnhw" Dec 13 02:06:18.191374 env[1218]: time="2024-12-13T02:06:18.191215028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2nnhw,Uid:b65bb69b-e938-4cf4-917f-41e147ddf684,Namespace:default,Attempt:0,}" Dec 13 02:06:18.273119 kubelet[1558]: E1213 02:06:18.273036 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:18.281205 env[1218]: time="2024-12-13T02:06:18.281123851Z" level=error msg="Failed to destroy network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.284290 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538-shm.mount: Deactivated successfully. Dec 13 02:06:18.286570 env[1218]: time="2024-12-13T02:06:18.286472341Z" level=error msg="encountered an error cleaning up failed sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.286733 env[1218]: time="2024-12-13T02:06:18.286603216Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2nnhw,Uid:b65bb69b-e938-4cf4-917f-41e147ddf684,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.286969 kubelet[1558]: E1213 02:06:18.286920 1558 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.287082 kubelet[1558]: E1213 02:06:18.287003 1558 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-2nnhw" Dec 13 02:06:18.287082 kubelet[1558]: E1213 02:06:18.287037 1558 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-2nnhw" Dec 13 02:06:18.287202 kubelet[1558]: E1213 02:06:18.287121 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-2nnhw_default(b65bb69b-e938-4cf4-917f-41e147ddf684)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-2nnhw_default(b65bb69b-e938-4cf4-917f-41e147ddf684)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-2nnhw" podUID="b65bb69b-e938-4cf4-917f-41e147ddf684" Dec 13 02:06:18.477024 systemd[1]: Created slice kubepods-besteffort-pod2e26474d_f57f_4a66_bed6_df9a23cb190c.slice. Dec 13 02:06:18.481227 env[1218]: time="2024-12-13T02:06:18.481174705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x874n,Uid:2e26474d-f57f-4a66-bed6-df9a23cb190c,Namespace:calico-system,Attempt:0,}" Dec 13 02:06:18.522076 env[1218]: time="2024-12-13T02:06:18.522016710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:06:18.525349 kubelet[1558]: I1213 02:06:18.523348 1558 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:06:18.527710 env[1218]: time="2024-12-13T02:06:18.527662152Z" level=info msg="StopPodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\"" Dec 13 02:06:18.594627 env[1218]: time="2024-12-13T02:06:18.594531585Z" level=error msg="StopPodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" failed" error="failed to destroy network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.594886 kubelet[1558]: E1213 02:06:18.594855 1558 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:06:18.595016 kubelet[1558]: E1213 02:06:18.594959 1558 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538"} Dec 13 02:06:18.595079 kubelet[1558]: E1213 02:06:18.595020 1558 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b65bb69b-e938-4cf4-917f-41e147ddf684\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:06:18.595079 kubelet[1558]: E1213 02:06:18.595065 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b65bb69b-e938-4cf4-917f-41e147ddf684\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-2nnhw" podUID="b65bb69b-e938-4cf4-917f-41e147ddf684" Dec 13 02:06:18.609214 env[1218]: time="2024-12-13T02:06:18.609131299Z" level=error msg="Failed to destroy network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.609720 env[1218]: time="2024-12-13T02:06:18.609657597Z" level=error msg="encountered an error cleaning up failed sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.609850 env[1218]: time="2024-12-13T02:06:18.609744940Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x874n,Uid:2e26474d-f57f-4a66-bed6-df9a23cb190c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.610094 kubelet[1558]: E1213 02:06:18.610053 1558 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:18.610234 kubelet[1558]: E1213 02:06:18.610126 1558 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:18.610234 kubelet[1558]: E1213 02:06:18.610159 1558 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x874n" Dec 13 02:06:18.610356 kubelet[1558]: E1213 02:06:18.610247 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x874n_calico-system(2e26474d-f57f-4a66-bed6-df9a23cb190c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x874n_calico-system(2e26474d-f57f-4a66-bed6-df9a23cb190c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:19.022066 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949-shm.mount: Deactivated successfully. Dec 13 02:06:19.273967 kubelet[1558]: E1213 02:06:19.273724 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:19.460690 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:06:19.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:19.480000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:06:19.480000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:06:19.480000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:06:19.526890 kubelet[1558]: I1213 02:06:19.526183 1558 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:06:19.527805 env[1218]: time="2024-12-13T02:06:19.527762800Z" level=info msg="StopPodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\"" Dec 13 02:06:19.610904 env[1218]: time="2024-12-13T02:06:19.610824581Z" level=error msg="StopPodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" failed" error="failed to destroy network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:06:19.611181 kubelet[1558]: E1213 02:06:19.611151 1558 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:06:19.611309 kubelet[1558]: E1213 02:06:19.611222 1558 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949"} Dec 13 02:06:19.611309 kubelet[1558]: E1213 02:06:19.611281 1558 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2e26474d-f57f-4a66-bed6-df9a23cb190c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:06:19.611545 kubelet[1558]: E1213 02:06:19.611335 1558 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2e26474d-f57f-4a66-bed6-df9a23cb190c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x874n" podUID="2e26474d-f57f-4a66-bed6-df9a23cb190c" Dec 13 02:06:20.274669 kubelet[1558]: E1213 02:06:20.274602 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:21.275872 kubelet[1558]: E1213 02:06:21.275772 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:22.276748 kubelet[1558]: E1213 02:06:22.276694 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:23.277580 kubelet[1558]: E1213 02:06:23.277514 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:24.262230 kubelet[1558]: E1213 02:06:24.262157 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:24.278599 kubelet[1558]: E1213 02:06:24.278472 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:25.279161 kubelet[1558]: E1213 02:06:25.279067 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:25.383469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2320234676.mount: Deactivated successfully. Dec 13 02:06:25.433199 env[1218]: time="2024-12-13T02:06:25.433121640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:25.436428 env[1218]: time="2024-12-13T02:06:25.436374768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:25.438857 env[1218]: time="2024-12-13T02:06:25.438798537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:25.441179 env[1218]: time="2024-12-13T02:06:25.441129971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:25.441886 env[1218]: time="2024-12-13T02:06:25.441829490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:06:25.461537 env[1218]: time="2024-12-13T02:06:25.460775013Z" level=info msg="CreateContainer within sandbox \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:06:25.483401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3660209015.mount: Deactivated successfully. Dec 13 02:06:25.491072 env[1218]: time="2024-12-13T02:06:25.490999857Z" level=info msg="CreateContainer within sandbox \"26815795e18d60ec9e67934facba994f8601f9ab5be0714802b8846487d381f6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"55b5d102617ce2efc8fa69341d6bc1d281b4e467f5f93352a101f731bedbed1c\"" Dec 13 02:06:25.492124 env[1218]: time="2024-12-13T02:06:25.492080751Z" level=info msg="StartContainer for \"55b5d102617ce2efc8fa69341d6bc1d281b4e467f5f93352a101f731bedbed1c\"" Dec 13 02:06:25.517354 systemd[1]: Started cri-containerd-55b5d102617ce2efc8fa69341d6bc1d281b4e467f5f93352a101f731bedbed1c.scope. Dec 13 02:06:25.577413 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 02:06:25.577690 kernel: audit: type=1400 audit(1734055585.550:549): avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f538f1e3cf8 items=0 ppid=1630 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:25.611599 kernel: audit: type=1300 audit(1734055585.550:549): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f538f1e3cf8 items=0 ppid=1630 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:25.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623564313032363137636532656663386661363933343164366263 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.661151 kernel: audit: type=1327 audit(1734055585.550:549): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623564313032363137636532656663386661363933343164366263 Dec 13 02:06:25.661326 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.682666 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.703682 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.745525 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.745688 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.747178 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.747378 env[1218]: time="2024-12-13T02:06:25.746001356Z" level=info msg="StartContainer for \"55b5d102617ce2efc8fa69341d6bc1d281b4e467f5f93352a101f731bedbed1c\" returns successfully" Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.787636 kernel: audit: type=1400 audit(1734055585.550:550): avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.550000 audit: BPF prog-id=81 op=LOAD Dec 13 02:06:25.550000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8d28 items=0 ppid=1630 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:25.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623564313032363137636532656663386661363933343164366263 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit: BPF prog-id=82 op=LOAD Dec 13 02:06:25.577000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a8d78 items=0 ppid=1630 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:25.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623564313032363137636532656663386661363933343164366263 Dec 13 02:06:25.577000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:06:25.577000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:25.577000 audit: BPF prog-id=83 op=LOAD Dec 13 02:06:25.577000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a8e08 items=0 ppid=1630 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:25.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623564313032363137636532656663386661363933343164366263 Dec 13 02:06:25.845923 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:06:25.846070 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:06:26.280112 kubelet[1558]: E1213 02:06:26.280059 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:26.562872 kubelet[1558]: I1213 02:06:26.562456 1558 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-7xbv4" podStartSLOduration=4.6025792580000005 podStartE2EDuration="22.562401304s" podCreationTimestamp="2024-12-13 02:06:04 +0000 UTC" firstStartedPulling="2024-12-13 02:06:07.483153679 +0000 UTC m=+3.859139996" lastFinishedPulling="2024-12-13 02:06:25.442975716 +0000 UTC m=+21.818962042" observedRunningTime="2024-12-13 02:06:26.562099598 +0000 UTC m=+22.938085968" watchObservedRunningTime="2024-12-13 02:06:26.562401304 +0000 UTC m=+22.938387663" Dec 13 02:06:27.198000 audit[2234]: AVC avc: denied { write } for pid=2234 comm="tee" name="fd" dev="proc" ino=19115 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.198000 audit[2234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe10bf79f3 a2=241 a3=1b6 items=1 ppid=2208 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.198000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:06:27.198000 audit: PATH item=0 name="/dev/fd/63" inode=19105 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.198000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.213000 audit[2248]: AVC avc: denied { write } for pid=2248 comm="tee" name="fd" dev="proc" ino=19738 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.213000 audit[2248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1a9b69f3 a2=241 a3=1b6 items=1 ppid=2213 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.213000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:06:27.213000 audit: PATH item=0 name="/dev/fd/63" inode=19116 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.213000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.215000 audit[2250]: AVC avc: denied { write } for pid=2250 comm="tee" name="fd" dev="proc" ino=19742 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.220000 audit[2240]: AVC avc: denied { write } for pid=2240 comm="tee" name="fd" dev="proc" ino=19745 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.220000 audit[2240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5fc8d9e4 a2=241 a3=1b6 items=1 ppid=2204 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.220000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:06:27.220000 audit: PATH item=0 name="/dev/fd/63" inode=19112 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.220000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.224000 audit[2263]: AVC avc: denied { write } for pid=2263 comm="tee" name="fd" dev="proc" ino=19126 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.227000 audit[2260]: AVC avc: denied { write } for pid=2260 comm="tee" name="fd" dev="proc" ino=19749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.227000 audit[2260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc73e819f5 a2=241 a3=1b6 items=1 ppid=2203 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.227000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:06:27.227000 audit: PATH item=0 name="/dev/fd/63" inode=19732 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.228000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=19751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:06:27.228000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1fb5a9f3 a2=241 a3=1b6 items=1 ppid=2207 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.228000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:06:27.228000 audit: PATH item=0 name="/dev/fd/63" inode=19724 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.215000 audit[2250]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6b1219e3 a2=241 a3=1b6 items=1 ppid=2211 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.215000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:06:27.215000 audit: PATH item=0 name="/dev/fd/63" inode=19729 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.215000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.224000 audit[2263]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9fbdb9f4 a2=241 a3=1b6 items=1 ppid=2214 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.224000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:06:27.224000 audit: PATH item=0 name="/dev/fd/63" inode=19120 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:06:27.224000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:06:27.280561 kubelet[1558]: E1213 02:06:27.280468 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.481000 audit: BPF prog-id=84 op=LOAD Dec 13 02:06:27.481000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdcef93810 a2=98 a3=3 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.481000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit: BPF prog-id=85 op=LOAD Dec 13 02:06:27.485000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdcef935f0 a2=74 a3=540051 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.485000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.485000 audit: BPF prog-id=85 op=UNLOAD Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.485000 audit: BPF prog-id=86 op=LOAD Dec 13 02:06:27.485000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdcef93620 a2=94 a3=2 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.485000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.485000 audit: BPF prog-id=86 op=UNLOAD Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.613000 audit: BPF prog-id=87 op=LOAD Dec 13 02:06:27.613000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdcef934e0 a2=40 a3=1 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.613000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.613000 audit: BPF prog-id=87 op=UNLOAD Dec 13 02:06:27.614000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.614000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdcef935b0 a2=50 a3=7ffdcef93690 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.614000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.625000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.625000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcef934f0 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.625000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcef93520 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcef93430 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcef93540 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcef93520 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcef93510 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcef93540 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcef93520 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcef93540 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcef93510 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcef93580 a2=28 a3=0 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdcef93330 a2=50 a3=1 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit: BPF prog-id=88 op=LOAD Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdcef93330 a2=94 a3=5 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit: BPF prog-id=88 op=UNLOAD Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdcef933e0 a2=50 a3=1 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdcef93500 a2=4 a3=38 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.626000 audit[2310]: AVC avc: denied { confidentiality } for pid=2310 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:27.626000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdcef93550 a2=94 a3=6 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { confidentiality } for pid=2310 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:27.627000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdcef92d00 a2=94 a3=83 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.627000 audit[2310]: AVC avc: denied { confidentiality } for pid=2310 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:27.627000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdcef92d00 a2=94 a3=83 items=0 ppid=2210 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit: BPF prog-id=89 op=LOAD Dec 13 02:06:27.639000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa658a570 a2=98 a3=1999999999999999 items=0 ppid=2210 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.639000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:27.639000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit: BPF prog-id=90 op=LOAD Dec 13 02:06:27.639000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa658a450 a2=74 a3=ffff items=0 ppid=2210 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.639000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:27.639000 audit: BPF prog-id=90 op=UNLOAD Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.639000 audit: BPF prog-id=91 op=LOAD Dec 13 02:06:27.639000 audit[2315]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa658a490 a2=40 a3=7fffa658a670 items=0 ppid=2210 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.639000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:27.639000 audit: BPF prog-id=91 op=UNLOAD Dec 13 02:06:27.727585 systemd-networkd[1024]: vxlan.calico: Link UP Dec 13 02:06:27.727600 systemd-networkd[1024]: vxlan.calico: Gained carrier Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.774000 audit: BPF prog-id=92 op=LOAD Dec 13 02:06:27.774000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd163ed9b0 a2=98 a3=ffffffff items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.774000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.774000 audit: BPF prog-id=92 op=UNLOAD Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit: BPF prog-id=93 op=LOAD Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd163ed7c0 a2=74 a3=540051 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit: BPF prog-id=93 op=UNLOAD Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit: BPF prog-id=94 op=LOAD Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd163ed7f0 a2=94 a3=2 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit: BPF prog-id=94 op=UNLOAD Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd163ed6c0 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd163ed6f0 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd163ed600 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd163ed710 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd163ed6f0 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd163ed6e0 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd163ed710 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd163ed6f0 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd163ed710 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd163ed6e0 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd163ed750 a2=28 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.775000 audit: BPF prog-id=95 op=LOAD Dec 13 02:06:27.775000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd163ed5c0 a2=40 a3=0 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.775000 audit: BPF prog-id=95 op=UNLOAD Dec 13 02:06:27.776000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.776000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd163ed5b0 a2=50 a3=2800 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd163ed5b0 a2=50 a3=2800 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit: BPF prog-id=96 op=LOAD Dec 13 02:06:27.779000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd163ecdd0 a2=94 a3=2 items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.779000 audit: BPF prog-id=96 op=UNLOAD Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.779000 audit: BPF prog-id=97 op=LOAD Dec 13 02:06:27.779000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd163eced0 a2=94 a3=2d items=0 ppid=2210 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit: BPF prog-id=98 op=LOAD Dec 13 02:06:27.792000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff66fe80f0 a2=98 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.792000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.792000 audit: BPF prog-id=98 op=UNLOAD Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit: BPF prog-id=99 op=LOAD Dec 13 02:06:27.792000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff66fe7ed0 a2=74 a3=540051 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.792000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.792000 audit: BPF prog-id=99 op=UNLOAD Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.792000 audit: BPF prog-id=100 op=LOAD Dec 13 02:06:27.792000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff66fe7f00 a2=94 a3=2 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.792000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.792000 audit: BPF prog-id=100 op=UNLOAD Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit: BPF prog-id=101 op=LOAD Dec 13 02:06:27.925000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff66fe7dc0 a2=40 a3=1 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.925000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:06:27.925000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.925000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff66fe7e90 a2=50 a3=7fff66fe7f70 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff66fe7dd0 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff66fe7e00 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff66fe7d10 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff66fe7e20 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff66fe7e00 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff66fe7df0 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff66fe7e20 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff66fe7e00 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff66fe7e20 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff66fe7df0 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.937000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.937000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff66fe7e60 a2=28 a3=0 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff66fe7c10 a2=50 a3=1 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit: BPF prog-id=102 op=LOAD Dec 13 02:06:27.938000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff66fe7c10 a2=94 a3=5 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.938000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff66fe7cc0 a2=50 a3=1 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff66fe7de0 a2=4 a3=38 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { confidentiality } for pid=2348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:27.938000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff66fe7e30 a2=94 a3=6 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.938000 audit[2348]: AVC avc: denied { confidentiality } for pid=2348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:27.938000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff66fe75e0 a2=94 a3=83 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.938000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { confidentiality } for pid=2348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:27.939000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff66fe75e0 a2=94 a3=83 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff66fe9020 a2=10 a3=f1f00800 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff66fe8ec0 a2=10 a3=3 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.939000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.939000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff66fe8e60 a2=10 a3=3 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.940000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:27.940000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff66fe8e60 a2=10 a3=7 items=0 ppid=2210 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.940000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:06:27.948000 audit: BPF prog-id=97 op=UNLOAD Dec 13 02:06:28.029000 audit[2372]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:28.029000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc3dc9f7f0 a2=0 a3=7ffc3dc9f7dc items=0 ppid=2210 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:28.029000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:28.041000 audit[2370]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:28.041000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffefe837a00 a2=0 a3=7ffefe8379ec items=0 ppid=2210 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:28.041000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:28.051000 audit[2371]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:28.051000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffed6498c70 a2=0 a3=7ffed6498c5c items=0 ppid=2210 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:28.051000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:28.053000 audit[2374]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:28.053000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe8ec701d0 a2=0 a3=7ffe8ec701bc items=0 ppid=2210 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:28.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:28.281549 kubelet[1558]: E1213 02:06:28.281492 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:29.281931 kubelet[1558]: E1213 02:06:29.281861 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:29.295681 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL Dec 13 02:06:29.470283 env[1218]: time="2024-12-13T02:06:29.470210594Z" level=info msg="StopPodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\"" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.525 [INFO][2398] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.525 [INFO][2398] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" iface="eth0" netns="/var/run/netns/cni-a229b4f4-43eb-3952-c6b5-4f81482481fa" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.525 [INFO][2398] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" iface="eth0" netns="/var/run/netns/cni-a229b4f4-43eb-3952-c6b5-4f81482481fa" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.526 [INFO][2398] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" iface="eth0" netns="/var/run/netns/cni-a229b4f4-43eb-3952-c6b5-4f81482481fa" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.526 [INFO][2398] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.526 [INFO][2398] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.554 [INFO][2404] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.555 [INFO][2404] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.555 [INFO][2404] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.563 [WARNING][2404] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.563 [INFO][2404] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.568 [INFO][2404] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:29.572563 env[1218]: 2024-12-13 02:06:29.570 [INFO][2398] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:06:29.577512 env[1218]: time="2024-12-13T02:06:29.576090163Z" level=info msg="TearDown network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" successfully" Dec 13 02:06:29.577512 env[1218]: time="2024-12-13T02:06:29.576143485Z" level=info msg="StopPodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" returns successfully" Dec 13 02:06:29.576165 systemd[1]: run-netns-cni\x2da229b4f4\x2d43eb\x2d3952\x2dc6b5\x2d4f81482481fa.mount: Deactivated successfully. Dec 13 02:06:29.578328 env[1218]: time="2024-12-13T02:06:29.578267262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2nnhw,Uid:b65bb69b-e938-4cf4-917f-41e147ddf684,Namespace:default,Attempt:1,}" Dec 13 02:06:29.836544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:06:29.836240 systemd-networkd[1024]: calib1b1294ba77: Link UP Dec 13 02:06:29.845530 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib1b1294ba77: link becomes ready Dec 13 02:06:29.845763 systemd-networkd[1024]: calib1b1294ba77: Gained carrier Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.703 [INFO][2411] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0 nginx-deployment-6d5f899847- default b65bb69b-e938-4cf4-917f-41e147ddf684 1009 0 2024-12-13 02:06:17 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.61 nginx-deployment-6d5f899847-2nnhw eth0 default [] [] [kns.default ksa.default.default] calib1b1294ba77 [] []}} ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.703 [INFO][2411] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.759 [INFO][2423] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" HandleID="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.788 [INFO][2423] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" HandleID="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003188d0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.61", "pod":"nginx-deployment-6d5f899847-2nnhw", "timestamp":"2024-12-13 02:06:29.759767312 +0000 UTC"}, Hostname:"10.128.0.61", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.788 [INFO][2423] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.788 [INFO][2423] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.788 [INFO][2423] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.61' Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.790 [INFO][2423] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.795 [INFO][2423] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.801 [INFO][2423] ipam/ipam.go 489: Trying affinity for 192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.803 [INFO][2423] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.806 [INFO][2423] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.806 [INFO][2423] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.128/26 handle="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.808 [INFO][2423] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.813 [INFO][2423] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.128/26 handle="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.824 [INFO][2423] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.129/26] block=192.168.81.128/26 handle="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.824 [INFO][2423] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.129/26] handle="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" host="10.128.0.61" Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.824 [INFO][2423] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:29.871083 env[1218]: 2024-12-13 02:06:29.824 [INFO][2423] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.129/26] IPv6=[] ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" HandleID="k8s-pod-network.f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.872224 env[1218]: 2024-12-13 02:06:29.826 [INFO][2411] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b65bb69b-e938-4cf4-917f-41e147ddf684", ResourceVersion:"1009", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"", Pod:"nginx-deployment-6d5f899847-2nnhw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1b1294ba77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:29.872224 env[1218]: 2024-12-13 02:06:29.826 [INFO][2411] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.129/32] ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.872224 env[1218]: 2024-12-13 02:06:29.826 [INFO][2411] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib1b1294ba77 ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.872224 env[1218]: 2024-12-13 02:06:29.847 [INFO][2411] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.872224 env[1218]: 2024-12-13 02:06:29.848 [INFO][2411] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b65bb69b-e938-4cf4-917f-41e147ddf684", ResourceVersion:"1009", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a", Pod:"nginx-deployment-6d5f899847-2nnhw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1b1294ba77", MAC:"62:e7:52:ee:3b:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:29.872224 env[1218]: 2024-12-13 02:06:29.861 [INFO][2411] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a" Namespace="default" Pod="nginx-deployment-6d5f899847-2nnhw" WorkloadEndpoint="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:06:29.884000 audit[2445]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:29.884000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffcdb6e35b0 a2=0 a3=7ffcdb6e359c items=0 ppid=2210 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.884000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:29.889731 env[1218]: time="2024-12-13T02:06:29.889643064Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:29.889982 env[1218]: time="2024-12-13T02:06:29.889939394Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:29.890172 env[1218]: time="2024-12-13T02:06:29.890134519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:29.890582 env[1218]: time="2024-12-13T02:06:29.890516942Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a pid=2453 runtime=io.containerd.runc.v2 Dec 13 02:06:29.913753 systemd[1]: Started cri-containerd-f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a.scope. Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.938000 audit: BPF prog-id=103 op=LOAD Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2453 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643037366232363436363538616365623061336133393364323562 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2453 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643037366232363436363538616365623061336133393364323562 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit: BPF prog-id=104 op=LOAD Dec 13 02:06:29.939000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d9ce0 items=0 ppid=2453 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643037366232363436363538616365623061336133393364323562 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit: BPF prog-id=105 op=LOAD Dec 13 02:06:29.939000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d9d28 items=0 ppid=2453 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643037366232363436363538616365623061336133393364323562 Dec 13 02:06:29.939000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:06:29.939000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:29.939000 audit: BPF prog-id=106 op=LOAD Dec 13 02:06:29.939000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003dc138 items=0 ppid=2453 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643037366232363436363538616365623061336133393364323562 Dec 13 02:06:29.980957 env[1218]: time="2024-12-13T02:06:29.980882682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2nnhw,Uid:b65bb69b-e938-4cf4-917f-41e147ddf684,Namespace:default,Attempt:1,} returns sandbox id \"f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a\"" Dec 13 02:06:29.983392 env[1218]: time="2024-12-13T02:06:29.983322892Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:06:30.282671 kubelet[1558]: E1213 02:06:30.282613 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:30.471844 env[1218]: time="2024-12-13T02:06:30.471754097Z" level=info msg="StopPodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\"" Dec 13 02:06:30.576258 systemd[1]: run-containerd-runc-k8s.io-f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a-runc.jI5wuC.mount: Deactivated successfully. Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.532 [INFO][2500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.532 [INFO][2500] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" iface="eth0" netns="/var/run/netns/cni-645c551a-be7b-a96f-fb36-0d8da4a7ed60" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.532 [INFO][2500] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" iface="eth0" netns="/var/run/netns/cni-645c551a-be7b-a96f-fb36-0d8da4a7ed60" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.533 [INFO][2500] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" iface="eth0" netns="/var/run/netns/cni-645c551a-be7b-a96f-fb36-0d8da4a7ed60" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.533 [INFO][2500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.533 [INFO][2500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.561 [INFO][2506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.562 [INFO][2506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.562 [INFO][2506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.569 [WARNING][2506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.569 [INFO][2506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.571 [INFO][2506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:30.579199 env[1218]: 2024-12-13 02:06:30.576 [INFO][2500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:06:30.582321 systemd[1]: run-netns-cni\x2d645c551a\x2dbe7b\x2da96f\x2dfb36\x2d0d8da4a7ed60.mount: Deactivated successfully. Dec 13 02:06:30.584734 env[1218]: time="2024-12-13T02:06:30.584677003Z" level=info msg="TearDown network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" successfully" Dec 13 02:06:30.584905 env[1218]: time="2024-12-13T02:06:30.584874144Z" level=info msg="StopPodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" returns successfully" Dec 13 02:06:30.585984 env[1218]: time="2024-12-13T02:06:30.585934458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x874n,Uid:2e26474d-f57f-4a66-bed6-df9a23cb190c,Namespace:calico-system,Attempt:1,}" Dec 13 02:06:30.764952 systemd-networkd[1024]: cali84bc8ec6881: Link UP Dec 13 02:06:30.765878 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali84bc8ec6881: link becomes ready Dec 13 02:06:30.766784 systemd-networkd[1024]: cali84bc8ec6881: Gained carrier Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.660 [INFO][2518] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.61-k8s-csi--node--driver--x874n-eth0 csi-node-driver- calico-system 2e26474d-f57f-4a66-bed6-df9a23cb190c 1017 0 2024-12-13 02:06:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.61 csi-node-driver-x874n eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali84bc8ec6881 [] []}} ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.660 [INFO][2518] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.700 [INFO][2525] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" HandleID="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.714 [INFO][2525] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" HandleID="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031d520), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.61", "pod":"csi-node-driver-x874n", "timestamp":"2024-12-13 02:06:30.700848326 +0000 UTC"}, Hostname:"10.128.0.61", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.714 [INFO][2525] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.714 [INFO][2525] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.714 [INFO][2525] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.61' Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.717 [INFO][2525] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.723 [INFO][2525] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.728 [INFO][2525] ipam/ipam.go 489: Trying affinity for 192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.730 [INFO][2525] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.733 [INFO][2525] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.733 [INFO][2525] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.128/26 handle="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.735 [INFO][2525] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069 Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.741 [INFO][2525] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.128/26 handle="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.748 [INFO][2525] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.130/26] block=192.168.81.128/26 handle="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.748 [INFO][2525] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.130/26] handle="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" host="10.128.0.61" Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.748 [INFO][2525] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:30.783519 env[1218]: 2024-12-13 02:06:30.748 [INFO][2525] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.130/26] IPv6=[] ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" HandleID="k8s-pod-network.527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.785087 env[1218]: 2024-12-13 02:06:30.750 [INFO][2518] cni-plugin/k8s.go 386: Populated endpoint ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-csi--node--driver--x874n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e26474d-f57f-4a66-bed6-df9a23cb190c", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"", Pod:"csi-node-driver-x874n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali84bc8ec6881", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:30.785087 env[1218]: 2024-12-13 02:06:30.751 [INFO][2518] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.130/32] ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.785087 env[1218]: 2024-12-13 02:06:30.751 [INFO][2518] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali84bc8ec6881 ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.785087 env[1218]: 2024-12-13 02:06:30.767 [INFO][2518] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.785087 env[1218]: 2024-12-13 02:06:30.768 [INFO][2518] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-csi--node--driver--x874n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e26474d-f57f-4a66-bed6-df9a23cb190c", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069", Pod:"csi-node-driver-x874n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali84bc8ec6881", MAC:"b2:06:20:69:18:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:30.785087 env[1218]: 2024-12-13 02:06:30.778 [INFO][2518] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069" Namespace="calico-system" Pod="csi-node-driver-x874n" WorkloadEndpoint="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:06:30.828519 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 02:06:30.828645 kernel: audit: type=1325 audit(1734055590.804:676): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:30.804000 audit[2548]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:30.828876 env[1218]: time="2024-12-13T02:06:30.811310924Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:30.828876 env[1218]: time="2024-12-13T02:06:30.811398381Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:30.828876 env[1218]: time="2024-12-13T02:06:30.811435922Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:30.828876 env[1218]: time="2024-12-13T02:06:30.811661445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069 pid=2556 runtime=io.containerd.runc.v2 Dec 13 02:06:30.804000 audit[2548]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc2e613750 a2=0 a3=7ffc2e61373c items=0 ppid=2210 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.869768 kernel: audit: type=1300 audit(1734055590.804:676): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc2e613750 a2=0 a3=7ffc2e61373c items=0 ppid=2210 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.868084 systemd[1]: Started cri-containerd-527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069.scope. Dec 13 02:06:30.913661 kernel: audit: type=1327 audit(1734055590.804:676): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:30.804000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.945513 kernel: audit: type=1400 audit(1734055590.900:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.945652 kernel: audit: type=1400 audit(1734055590.900:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.987554 kernel: audit: type=1400 audit(1734055590.900:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.987705 kernel: audit: type=1400 audit(1734055590.900:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.994518 env[1218]: time="2024-12-13T02:06:30.994447909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x874n,Uid:2e26474d-f57f-4a66-bed6-df9a23cb190c,Namespace:calico-system,Attempt:1,} returns sandbox id \"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069\"" Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:31.031065 kernel: audit: type=1400 audit(1734055590.900:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:31.031073 systemd-networkd[1024]: calib1b1294ba77: Gained IPv6LL Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:31.053510 kernel: audit: type=1400 audit(1734055590.900:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:31.053678 kernel: audit: type=1400 audit(1734055590.900:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.912000 audit: BPF prog-id=107 op=LOAD Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532376266346135313561663163353632653239373632626664613665 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532376266346135313561663163353632653239373632626664613665 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit: BPF prog-id=108 op=LOAD Dec 13 02:06:30.913000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000220360 items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532376266346135313561663163353632653239373632626664613665 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.913000 audit: BPF prog-id=109 op=LOAD Dec 13 02:06:30.913000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002203a8 items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532376266346135313561663163353632653239373632626664613665 Dec 13 02:06:30.913000 audit: BPF prog-id=109 op=UNLOAD Dec 13 02:06:30.913000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:30.914000 audit: BPF prog-id=110 op=LOAD Dec 13 02:06:30.914000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002207b8 items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532376266346135313561663163353632653239373632626664613665 Dec 13 02:06:31.282873 kubelet[1558]: E1213 02:06:31.282788 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:32.112902 systemd-networkd[1024]: cali84bc8ec6881: Gained IPv6LL Dec 13 02:06:32.283528 kubelet[1558]: E1213 02:06:32.283434 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:32.769832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1782402089.mount: Deactivated successfully. Dec 13 02:06:33.283674 kubelet[1558]: E1213 02:06:33.283597 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:33.769515 kubelet[1558]: I1213 02:06:33.768885 1558 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:06:33.825676 systemd[1]: run-containerd-runc-k8s.io-55b5d102617ce2efc8fa69341d6bc1d281b4e467f5f93352a101f731bedbed1c-runc.yAIRaI.mount: Deactivated successfully. Dec 13 02:06:34.284241 kubelet[1558]: E1213 02:06:34.284187 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:34.328617 update_engine[1206]: I1213 02:06:34.328559 1206 update_attempter.cc:509] Updating boot flags... Dec 13 02:06:34.895168 env[1218]: time="2024-12-13T02:06:34.895085868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:34.898245 env[1218]: time="2024-12-13T02:06:34.898191477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:34.901021 env[1218]: time="2024-12-13T02:06:34.900958498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:34.904135 env[1218]: time="2024-12-13T02:06:34.904074147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:34.905227 env[1218]: time="2024-12-13T02:06:34.905168079Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:06:34.908622 env[1218]: time="2024-12-13T02:06:34.908556367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:06:34.909250 env[1218]: time="2024-12-13T02:06:34.909193103Z" level=info msg="CreateContainer within sandbox \"f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 02:06:34.929716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3451083211.mount: Deactivated successfully. Dec 13 02:06:34.933739 env[1218]: time="2024-12-13T02:06:34.933683762Z" level=info msg="CreateContainer within sandbox \"f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"0adb13ba2651aca8b1006ba45bd0071dcd9bc81673de89ac00fba05e2cdf3828\"" Dec 13 02:06:34.934849 env[1218]: time="2024-12-13T02:06:34.934802692Z" level=info msg="StartContainer for \"0adb13ba2651aca8b1006ba45bd0071dcd9bc81673de89ac00fba05e2cdf3828\"" Dec 13 02:06:34.965710 systemd[1]: Started cri-containerd-0adb13ba2651aca8b1006ba45bd0071dcd9bc81673de89ac00fba05e2cdf3828.scope. Dec 13 02:06:34.983790 systemd[1]: run-containerd-runc-k8s.io-0adb13ba2651aca8b1006ba45bd0071dcd9bc81673de89ac00fba05e2cdf3828-runc.QEz1ug.mount: Deactivated successfully. Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.999000 audit: BPF prog-id=111 op=LOAD Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2453 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646231336261323635316163613862313030366261343562643030 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2453 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646231336261323635316163613862313030366261343562643030 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit: BPF prog-id=112 op=LOAD Dec 13 02:06:35.000000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002828c0 items=0 ppid=2453 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646231336261323635316163613862313030366261343562643030 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.000000 audit: BPF prog-id=113 op=LOAD Dec 13 02:06:35.000000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000282908 items=0 ppid=2453 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646231336261323635316163613862313030366261343562643030 Dec 13 02:06:35.000000 audit: BPF prog-id=113 op=UNLOAD Dec 13 02:06:35.000000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.001000 audit: BPF prog-id=114 op=LOAD Dec 13 02:06:35.001000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000282d18 items=0 ppid=2453 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646231336261323635316163613862313030366261343562643030 Dec 13 02:06:35.024515 env[1218]: time="2024-12-13T02:06:35.021812762Z" level=info msg="StartContainer for \"0adb13ba2651aca8b1006ba45bd0071dcd9bc81673de89ac00fba05e2cdf3828\" returns successfully" Dec 13 02:06:35.284524 kubelet[1558]: E1213 02:06:35.284434 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:35.912578 env[1218]: time="2024-12-13T02:06:35.912508824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:35.915307 env[1218]: time="2024-12-13T02:06:35.915257842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:35.917568 env[1218]: time="2024-12-13T02:06:35.917516756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:35.919546 env[1218]: time="2024-12-13T02:06:35.919502512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:35.920278 env[1218]: time="2024-12-13T02:06:35.920225538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:06:35.923029 env[1218]: time="2024-12-13T02:06:35.922971356Z" level=info msg="CreateContainer within sandbox \"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:06:35.945024 env[1218]: time="2024-12-13T02:06:35.944949518Z" level=info msg="CreateContainer within sandbox \"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"496c275d89f2fb59dc68b6d3113544ea1eeee1547b5d78edc9834ff995931b72\"" Dec 13 02:06:35.946378 env[1218]: time="2024-12-13T02:06:35.946331936Z" level=info msg="StartContainer for \"496c275d89f2fb59dc68b6d3113544ea1eeee1547b5d78edc9834ff995931b72\"" Dec 13 02:06:35.987808 systemd[1]: Started cri-containerd-496c275d89f2fb59dc68b6d3113544ea1eeee1547b5d78edc9834ff995931b72.scope. Dec 13 02:06:36.035532 kernel: kauditd_printk_skb: 107 callbacks suppressed Dec 13 02:06:36.035746 kernel: audit: type=1400 audit(1734055596.008:713): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.068232 kernel: audit: type=1300 audit(1734055596.008:713): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001276b0 a2=3c a3=7f7630267b18 items=0 ppid=2556 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:36.008000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001276b0 a2=3c a3=7f7630267b18 items=0 ppid=2556 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:36.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439366332373564383966326662353964633638623664333131333534 Dec 13 02:06:36.117890 kernel: audit: type=1327 audit(1734055596.008:713): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439366332373564383966326662353964633638623664333131333534 Dec 13 02:06:36.118081 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.161670 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.161836 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.183669 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.184471 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.185188 env[1218]: time="2024-12-13T02:06:36.185129984Z" level=info msg="StartContainer for \"496c275d89f2fb59dc68b6d3113544ea1eeee1547b5d78edc9834ff995931b72\" returns successfully" Dec 13 02:06:36.187427 env[1218]: time="2024-12-13T02:06:36.187370120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.204764 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.225626 kernel: audit: type=1400 audit(1734055596.008:714): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit: BPF prog-id=115 op=LOAD Dec 13 02:06:36.008000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001279d8 a2=78 a3=c00030a518 items=0 ppid=2556 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:36.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439366332373564383966326662353964633638623664333131333534 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.008000 audit: BPF prog-id=116 op=LOAD Dec 13 02:06:36.008000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000127770 a2=78 a3=c00030a568 items=0 ppid=2556 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:36.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439366332373564383966326662353964633638623664333131333534 Dec 13 02:06:36.035000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:06:36.035000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:36.035000 audit: BPF prog-id=117 op=LOAD Dec 13 02:06:36.035000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000127c30 a2=78 a3=c00030a5f8 items=0 ppid=2556 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:36.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439366332373564383966326662353964633638623664333131333534 Dec 13 02:06:36.285374 kubelet[1558]: E1213 02:06:36.285311 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:37.278440 env[1218]: time="2024-12-13T02:06:37.278370962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:37.281119 env[1218]: time="2024-12-13T02:06:37.281068648Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:37.283218 env[1218]: time="2024-12-13T02:06:37.283177670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:37.285538 env[1218]: time="2024-12-13T02:06:37.285501871Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:37.286123 kubelet[1558]: E1213 02:06:37.286073 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:37.286732 env[1218]: time="2024-12-13T02:06:37.286682586Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:06:37.289316 env[1218]: time="2024-12-13T02:06:37.289273417Z" level=info msg="CreateContainer within sandbox \"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:06:37.309163 env[1218]: time="2024-12-13T02:06:37.309096668Z" level=info msg="CreateContainer within sandbox \"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9b8813dabab881e0d37fb935e747ecd4af65a403869a5557b38648702f8e4068\"" Dec 13 02:06:37.309885 env[1218]: time="2024-12-13T02:06:37.309803570Z" level=info msg="StartContainer for \"9b8813dabab881e0d37fb935e747ecd4af65a403869a5557b38648702f8e4068\"" Dec 13 02:06:37.347899 systemd[1]: Started cri-containerd-9b8813dabab881e0d37fb935e747ecd4af65a403869a5557b38648702f8e4068.scope. Dec 13 02:06:37.365000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.365000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f99c5a4a118 items=0 ppid=2556 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:37.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962383831336461626162383831653064333766623933356537343765 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit: BPF prog-id=118 op=LOAD Dec 13 02:06:37.366000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c8528 items=0 ppid=2556 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:37.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962383831336461626162383831653064333766623933356537343765 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit: BPF prog-id=119 op=LOAD Dec 13 02:06:37.366000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c8578 items=0 ppid=2556 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:37.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962383831336461626162383831653064333766623933356537343765 Dec 13 02:06:37.366000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:06:37.366000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:37.366000 audit: BPF prog-id=120 op=LOAD Dec 13 02:06:37.366000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c8608 items=0 ppid=2556 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:37.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962383831336461626162383831653064333766623933356537343765 Dec 13 02:06:37.391119 env[1218]: time="2024-12-13T02:06:37.391058335Z" level=info msg="StartContainer for \"9b8813dabab881e0d37fb935e747ecd4af65a403869a5557b38648702f8e4068\" returns successfully" Dec 13 02:06:37.425587 kubelet[1558]: I1213 02:06:37.425104 1558 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:06:37.425587 kubelet[1558]: I1213 02:06:37.425147 1558 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:06:37.614885 kubelet[1558]: I1213 02:06:37.612785 1558 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-x874n" podStartSLOduration=27.322923588 podStartE2EDuration="33.612726862s" podCreationTimestamp="2024-12-13 02:06:04 +0000 UTC" firstStartedPulling="2024-12-13 02:06:30.997140145 +0000 UTC m=+27.373126461" lastFinishedPulling="2024-12-13 02:06:37.286943407 +0000 UTC m=+33.662929735" observedRunningTime="2024-12-13 02:06:37.611464671 +0000 UTC m=+33.987451009" watchObservedRunningTime="2024-12-13 02:06:37.612726862 +0000 UTC m=+33.988713202" Dec 13 02:06:37.614885 kubelet[1558]: I1213 02:06:37.612999 1558 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-2nnhw" podStartSLOduration=15.689233834 podStartE2EDuration="20.612938837s" podCreationTimestamp="2024-12-13 02:06:17 +0000 UTC" firstStartedPulling="2024-12-13 02:06:29.982811036 +0000 UTC m=+26.358797347" lastFinishedPulling="2024-12-13 02:06:34.906516019 +0000 UTC m=+31.282502350" observedRunningTime="2024-12-13 02:06:35.596640181 +0000 UTC m=+31.972626519" watchObservedRunningTime="2024-12-13 02:06:37.612938837 +0000 UTC m=+33.988925175" Dec 13 02:06:38.286540 kubelet[1558]: E1213 02:06:38.286467 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:39.287439 kubelet[1558]: E1213 02:06:39.287366 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:40.288188 kubelet[1558]: E1213 02:06:40.288118 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:41.166000 audit[2792]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.172514 kernel: kauditd_printk_skb: 76 callbacks suppressed Dec 13 02:06:41.172627 kernel: audit: type=1325 audit(1734055601.166:725): table=filter:71 family=2 entries=8 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.166000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc79bc6e0 a2=0 a3=7ffcc79bc6cc items=0 ppid=1721 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.221537 kernel: audit: type=1300 audit(1734055601.166:725): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc79bc6e0 a2=0 a3=7ffcc79bc6cc items=0 ppid=1721 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.221730 kernel: audit: type=1327 audit(1734055601.166:725): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:41.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:41.221000 audit[2792]: NETFILTER_CFG table=nat:72 family=2 entries=34 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.253143 kernel: audit: type=1325 audit(1734055601.221:726): table=nat:72 family=2 entries=34 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.253308 kernel: audit: type=1300 audit(1734055601.221:726): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcc79bc6e0 a2=0 a3=7ffcc79bc6cc items=0 ppid=1721 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.221000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcc79bc6e0 a2=0 a3=7ffcc79bc6cc items=0 ppid=1721 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:41.289053 kubelet[1558]: E1213 02:06:41.288963 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:41.301790 kernel: audit: type=1327 audit(1734055601.221:726): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:42.289684 kubelet[1558]: E1213 02:06:42.289615 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:43.290493 kubelet[1558]: E1213 02:06:43.290401 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:44.262924 kubelet[1558]: E1213 02:06:44.262859 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:44.291292 kubelet[1558]: E1213 02:06:44.291212 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:45.233000 audit[2794]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.251576 kernel: audit: type=1325 audit(1734055605.233:727): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.233000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe562e4ca0 a2=0 a3=7ffe562e4c8c items=0 ppid=1721 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.287191 kubelet[1558]: I1213 02:06:45.287132 1558 topology_manager.go:215] "Topology Admit Handler" podUID="a3e1820c-344b-4859-a47d-a68551d9164d" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 02:06:45.292329 kubelet[1558]: E1213 02:06:45.292264 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:45.296637 systemd[1]: Created slice kubepods-besteffort-poda3e1820c_344b_4859_a47d_a68551d9164d.slice. Dec 13 02:06:45.300289 kernel: audit: type=1300 audit(1734055605.233:727): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe562e4ca0 a2=0 a3=7ffe562e4c8c items=0 ppid=1721 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.300435 kernel: audit: type=1327 audit(1734055605.233:727): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.300000 audit[2794]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.317149 kubelet[1558]: I1213 02:06:45.317105 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zdkj9\" (UniqueName: \"kubernetes.io/projected/a3e1820c-344b-4859-a47d-a68551d9164d-kube-api-access-zdkj9\") pod \"nfs-server-provisioner-0\" (UID: \"a3e1820c-344b-4859-a47d-a68551d9164d\") " pod="default/nfs-server-provisioner-0" Dec 13 02:06:45.317593 kubelet[1558]: I1213 02:06:45.317572 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a3e1820c-344b-4859-a47d-a68551d9164d-data\") pod \"nfs-server-provisioner-0\" (UID: \"a3e1820c-344b-4859-a47d-a68551d9164d\") " pod="default/nfs-server-provisioner-0" Dec 13 02:06:45.300000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe562e4ca0 a2=0 a3=0 items=0 ppid=1721 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.318514 kernel: audit: type=1325 audit(1734055605.300:728): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.330000 audit[2798]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.330000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdea7b1240 a2=0 a3=7ffdea7b122c items=0 ppid=1721 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.335000 audit[2798]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.335000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdea7b1240 a2=0 a3=0 items=0 ppid=1721 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.604758 env[1218]: time="2024-12-13T02:06:45.604684116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a3e1820c-344b-4859-a47d-a68551d9164d,Namespace:default,Attempt:0,}" Dec 13 02:06:45.958902 systemd-networkd[1024]: cali60e51b789ff: Link UP Dec 13 02:06:45.962773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:06:45.971262 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 02:06:45.970816 systemd-networkd[1024]: cali60e51b789ff: Gained carrier Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.848 [INFO][2800] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.61-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a3e1820c-344b-4859-a47d-a68551d9164d 1104 0 2024-12-13 02:06:45 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.61 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.848 [INFO][2800] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.895 [INFO][2812] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" HandleID="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Workload="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.912 [INFO][2812] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" HandleID="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Workload="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011dd70), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.61", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:06:45.895257014 +0000 UTC"}, Hostname:"10.128.0.61", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.912 [INFO][2812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.912 [INFO][2812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.912 [INFO][2812] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.61' Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.915 [INFO][2812] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.921 [INFO][2812] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.927 [INFO][2812] ipam/ipam.go 489: Trying affinity for 192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.929 [INFO][2812] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.932 [INFO][2812] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.932 [INFO][2812] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.128/26 handle="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.935 [INFO][2812] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.942 [INFO][2812] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.128/26 handle="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.950 [INFO][2812] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.131/26] block=192.168.81.128/26 handle="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.950 [INFO][2812] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.131/26] handle="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" host="10.128.0.61" Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.950 [INFO][2812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:45.999653 env[1218]: 2024-12-13 02:06:45.950 [INFO][2812] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.131/26] IPv6=[] ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" HandleID="k8s-pod-network.9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Workload="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:46.000903 env[1218]: 2024-12-13 02:06:45.952 [INFO][2800] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a3e1820c-344b-4859-a47d-a68551d9164d", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.81.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:46.000903 env[1218]: 2024-12-13 02:06:45.952 [INFO][2800] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.131/32] ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:46.000903 env[1218]: 2024-12-13 02:06:45.952 [INFO][2800] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:46.000903 env[1218]: 2024-12-13 02:06:45.971 [INFO][2800] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:46.001297 env[1218]: 2024-12-13 02:06:45.972 [INFO][2800] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a3e1820c-344b-4859-a47d-a68551d9164d", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.81.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8e:36:08:25:6d:ce", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:46.001297 env[1218]: 2024-12-13 02:06:45.998 [INFO][2800] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.61-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:06:46.020258 env[1218]: time="2024-12-13T02:06:46.020152796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:06:46.020515 env[1218]: time="2024-12-13T02:06:46.020211883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:06:46.020515 env[1218]: time="2024-12-13T02:06:46.020230995Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:06:46.020515 env[1218]: time="2024-12-13T02:06:46.020441307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b pid=2838 runtime=io.containerd.runc.v2 Dec 13 02:06:46.053832 systemd[1]: Started cri-containerd-9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b.scope. Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.073000 audit: BPF prog-id=121 op=LOAD Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2838 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373466366338663233316138373235313631316566393864616334 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2838 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373466366338663233316138373235313631316566393864616334 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit: BPF prog-id=122 op=LOAD Dec 13 02:06:46.074000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000223ac0 items=0 ppid=2838 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373466366338663233316138373235313631316566393864616334 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.074000 audit: BPF prog-id=123 op=LOAD Dec 13 02:06:46.074000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000223b08 items=0 ppid=2838 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373466366338663233316138373235313631316566393864616334 Dec 13 02:06:46.075000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:06:46.075000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { perfmon } for pid=2848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit[2848]: AVC avc: denied { bpf } for pid=2848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:46.075000 audit: BPF prog-id=124 op=LOAD Dec 13 02:06:46.075000 audit[2848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000223f18 items=0 ppid=2838 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373466366338663233316138373235313631316566393864616334 Dec 13 02:06:46.103000 audit[2867]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=2867 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:46.103000 audit[2867]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffb51fb750 a2=0 a3=7fffb51fb73c items=0 ppid=2210 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:46.123915 env[1218]: time="2024-12-13T02:06:46.123861442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a3e1820c-344b-4859-a47d-a68551d9164d,Namespace:default,Attempt:0,} returns sandbox id \"9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b\"" Dec 13 02:06:46.126846 env[1218]: time="2024-12-13T02:06:46.126785433Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 02:06:46.293516 kubelet[1558]: E1213 02:06:46.293433 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:46.434611 systemd[1]: run-containerd-runc-k8s.io-9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b-runc.7gUZh3.mount: Deactivated successfully. Dec 13 02:06:47.294089 kubelet[1558]: E1213 02:06:47.294040 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:47.855726 systemd-networkd[1024]: cali60e51b789ff: Gained IPv6LL Dec 13 02:06:48.294676 kubelet[1558]: E1213 02:06:48.294586 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:48.832190 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2216861140.mount: Deactivated successfully. Dec 13 02:06:49.295122 kubelet[1558]: E1213 02:06:49.295069 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:50.296175 kubelet[1558]: E1213 02:06:50.296088 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:51.293124 env[1218]: time="2024-12-13T02:06:51.293057549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:51.296207 env[1218]: time="2024-12-13T02:06:51.296141148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:51.297237 kubelet[1558]: E1213 02:06:51.297158 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:51.298866 env[1218]: time="2024-12-13T02:06:51.298805901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:51.301573 env[1218]: time="2024-12-13T02:06:51.301528419Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:51.303062 env[1218]: time="2024-12-13T02:06:51.303004595Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 02:06:51.306343 env[1218]: time="2024-12-13T02:06:51.306284307Z" level=info msg="CreateContainer within sandbox \"9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 02:06:51.326882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount740761616.mount: Deactivated successfully. Dec 13 02:06:51.339061 env[1218]: time="2024-12-13T02:06:51.338991778Z" level=info msg="CreateContainer within sandbox \"9174f6c8f231a87251611ef98dac49c95ea6b9dd3b350e32771946b28e45862b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"6de3f34a3a92a997148b048023db64064b72040665e4c5e485f81ea0c1a01a8e\"" Dec 13 02:06:51.339975 env[1218]: time="2024-12-13T02:06:51.339926909Z" level=info msg="StartContainer for \"6de3f34a3a92a997148b048023db64064b72040665e4c5e485f81ea0c1a01a8e\"" Dec 13 02:06:51.376013 systemd[1]: Started cri-containerd-6de3f34a3a92a997148b048023db64064b72040665e4c5e485f81ea0c1a01a8e.scope. Dec 13 02:06:51.397454 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:06:51.397632 kernel: audit: type=1400 audit(1734055611.390:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.438350 kernel: audit: type=1400 audit(1734055611.390:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.438509 kernel: audit: type=1400 audit(1734055611.390:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.480547 kernel: audit: type=1400 audit(1734055611.390:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.524164 kernel: audit: type=1400 audit(1734055611.390:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.524379 kernel: audit: type=1400 audit(1734055611.390:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.524428 kernel: audit: type=1400 audit(1734055611.390:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.567537 kernel: audit: type=1400 audit(1734055611.390:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.591518 kernel: audit: type=1400 audit(1734055611.390:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.437000 audit: BPF prog-id=125 op=LOAD Dec 13 02:06:51.612659 kernel: audit: type=1400 audit(1734055611.437:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2838 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653366333461336139326139393731343862303438303233646236 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2838 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653366333461336139326139393731343862303438303233646236 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.444000 audit: BPF prog-id=126 op=LOAD Dec 13 02:06:51.444000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003049b0 items=0 ppid=2838 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653366333461336139326139393731343862303438303233646236 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit: BPF prog-id=127 op=LOAD Dec 13 02:06:51.479000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003049f8 items=0 ppid=2838 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653366333461336139326139393731343862303438303233646236 Dec 13 02:06:51.479000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:06:51.479000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:51.479000 audit: BPF prog-id=128 op=LOAD Dec 13 02:06:51.479000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000304e08 items=0 ppid=2838 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653366333461336139326139393731343862303438303233646236 Dec 13 02:06:51.615763 env[1218]: time="2024-12-13T02:06:51.615658560Z" level=info msg="StartContainer for \"6de3f34a3a92a997148b048023db64064b72040665e4c5e485f81ea0c1a01a8e\" returns successfully" Dec 13 02:06:51.641000 audit[2919]: AVC avc: denied { search } for pid=2919 comm="rpcbind" name="crypto" dev="proc" ino=22623 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:06:51.641000 audit[2919]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f99b31b10c0 a2=0 a3=0 items=0 ppid=2902 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 key=(null) Dec 13 02:06:51.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 02:06:51.688401 kubelet[1558]: I1213 02:06:51.688354 1558 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.511006988 podStartE2EDuration="6.688296553s" podCreationTimestamp="2024-12-13 02:06:45 +0000 UTC" firstStartedPulling="2024-12-13 02:06:46.126088581 +0000 UTC m=+42.502074891" lastFinishedPulling="2024-12-13 02:06:51.303378127 +0000 UTC m=+47.679364456" observedRunningTime="2024-12-13 02:06:51.686455227 +0000 UTC m=+48.062441568" watchObservedRunningTime="2024-12-13 02:06:51.688296553 +0000 UTC m=+48.064282890" Dec 13 02:06:51.701000 audit[2925]: AVC avc: denied { search } for pid=2925 comm="dbus-daemon" name="crypto" dev="proc" ino=22623 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:06:51.701000 audit[2925]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f00a1ae70c0 a2=0 a3=0 items=0 ppid=2902 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 key=(null) Dec 13 02:06:51.701000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:06:51.705000 audit[2926]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:51.705000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7bed2550 a2=0 a3=7ffd7bed253c items=0 ppid=1721 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:51.707000 audit[2927]: AVC avc: denied { watch } for pid=2927 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538702 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c19,c186 tclass=dir permissive=0 Dec 13 02:06:51.707000 audit[2927]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=561fed33a940 a2=2c8 a3=7ffe63e99f0c items=0 ppid=2902 pid=2927 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 key=(null) Dec 13 02:06:51.707000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:06:51.713000 audit[2928]: AVC avc: denied { read } for pid=2928 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23583 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 02:06:51.713000 audit[2926]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:51.713000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd7bed2550 a2=0 a3=7ffd7bed253c items=0 ppid=1721 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:51.713000 audit[2928]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7eff164df320 a1=80000 a2=d a3=7fff2ba07c90 items=0 ppid=2902 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 key=(null) Dec 13 02:06:51.713000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:06:51.716000 audit[2928]: AVC avc: denied { search } for pid=2928 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22623 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:06:51.716000 audit[2928]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7eff15a330c0 a2=0 a3=0 items=0 ppid=2902 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c186 key=(null) Dec 13 02:06:51.716000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:06:52.297575 kubelet[1558]: E1213 02:06:52.297506 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:53.298074 kubelet[1558]: E1213 02:06:53.298005 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:54.298270 kubelet[1558]: E1213 02:06:54.298205 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:55.299005 kubelet[1558]: E1213 02:06:55.298940 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:56.300134 kubelet[1558]: E1213 02:06:56.300054 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:57.300848 kubelet[1558]: E1213 02:06:57.300770 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:58.301411 kubelet[1558]: E1213 02:06:58.301340 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:06:59.302143 kubelet[1558]: E1213 02:06:59.302079 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:00.302674 kubelet[1558]: E1213 02:07:00.302598 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:01.303013 kubelet[1558]: E1213 02:07:01.302942 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:01.417169 kubelet[1558]: I1213 02:07:01.417128 1558 topology_manager.go:215] "Topology Admit Handler" podUID="0c44fb82-153a-47b5-9f4e-dddab34b5dbb" podNamespace="default" podName="test-pod-1" Dec 13 02:07:01.424293 systemd[1]: Created slice kubepods-besteffort-pod0c44fb82_153a_47b5_9f4e_dddab34b5dbb.slice. Dec 13 02:07:01.543169 kubelet[1558]: I1213 02:07:01.543111 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5lbw\" (UniqueName: \"kubernetes.io/projected/0c44fb82-153a-47b5-9f4e-dddab34b5dbb-kube-api-access-d5lbw\") pod \"test-pod-1\" (UID: \"0c44fb82-153a-47b5-9f4e-dddab34b5dbb\") " pod="default/test-pod-1" Dec 13 02:07:01.543169 kubelet[1558]: I1213 02:07:01.543181 1558 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-78bf0e19-73a9-462b-b54e-d19db1b93607\" (UniqueName: \"kubernetes.io/nfs/0c44fb82-153a-47b5-9f4e-dddab34b5dbb-pvc-78bf0e19-73a9-462b-b54e-d19db1b93607\") pod \"test-pod-1\" (UID: \"0c44fb82-153a-47b5-9f4e-dddab34b5dbb\") " pod="default/test-pod-1" Dec 13 02:07:01.670434 kernel: Failed to create system directory netfs Dec 13 02:07:01.670638 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:07:01.670684 kernel: audit: type=1400 audit(1734055621.663:775): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.663000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.699548 kernel: Failed to create system directory netfs Dec 13 02:07:01.699666 kernel: audit: type=1400 audit(1734055621.663:775): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.663000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.726881 kernel: Failed to create system directory netfs Dec 13 02:07:01.727051 kernel: audit: type=1400 audit(1734055621.663:775): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.663000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.754967 kernel: Failed to create system directory netfs Dec 13 02:07:01.755139 kernel: audit: type=1400 audit(1734055621.663:775): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.663000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.663000 audit[2952]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d4015305e0 a1=153bc a2=55d3f4a312b0 a3=5 items=0 ppid=56 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:01.663000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:01.826737 kernel: audit: type=1300 audit(1734055621.663:775): arch=c000003e syscall=175 success=yes exit=0 a0=55d4015305e0 a1=153bc a2=55d3f4a312b0 a3=5 items=0 ppid=56 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:01.826848 kernel: audit: type=1327 audit(1734055621.663:775): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:01.832405 kernel: Failed to create system directory fscache Dec 13 02:07:01.832541 kernel: audit: type=1400 audit(1734055621.795:776): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.860743 kernel: Failed to create system directory fscache Dec 13 02:07:01.860891 kernel: audit: type=1400 audit(1734055621.795:776): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.889010 kernel: Failed to create system directory fscache Dec 13 02:07:01.889182 kernel: audit: type=1400 audit(1734055621.795:776): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.917347 kernel: Failed to create system directory fscache Dec 13 02:07:01.917505 kernel: audit: type=1400 audit(1734055621.795:776): avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.943627 kernel: Failed to create system directory fscache Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.950721 kernel: Failed to create system directory fscache Dec 13 02:07:01.950828 kernel: Failed to create system directory fscache Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.961270 kernel: Failed to create system directory fscache Dec 13 02:07:01.961398 kernel: Failed to create system directory fscache Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.976903 kernel: Failed to create system directory fscache Dec 13 02:07:01.977011 kernel: Failed to create system directory fscache Dec 13 02:07:01.977056 kernel: Failed to create system directory fscache Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.987309 kernel: Failed to create system directory fscache Dec 13 02:07:01.795000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:01.992639 kernel: Failed to create system directory fscache Dec 13 02:07:01.795000 audit[2952]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d4017459c0 a1=4c0fc a2=55d3f4a312b0 a3=5 items=0 ppid=56 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:01.997631 kernel: FS-Cache: Loaded Dec 13 02:07:01.795000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.048006 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.048123 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.048165 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.058235 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.058311 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.068470 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.068591 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.078692 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.078830 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.088930 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.089038 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.099176 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.099250 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.109436 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.109528 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.119676 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.119761 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.129901 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.130001 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.135081 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.145255 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.145357 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.155499 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.155577 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.165702 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.165799 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.175923 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.176030 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.186240 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.186375 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.196495 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.196595 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.206783 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.206910 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.217040 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.217170 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.227311 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.227434 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.232525 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.242756 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.248040 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.253288 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.253383 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.268830 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.268913 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.268949 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.274518 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.284354 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.289574 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.294770 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.300007 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.300518 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.303918 kubelet[1558]: E1213 02:07:02.303843 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.305568 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.320729 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.320792 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.320825 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.330974 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.331049 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.341229 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.341289 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.351460 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.351568 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.361691 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.361769 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.371926 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.371985 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.382154 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.382257 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.392389 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.392495 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.398521 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.407782 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.412975 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.413064 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.418517 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.428368 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.428453 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.438633 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.438741 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.448885 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.448971 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.459153 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.459268 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.469406 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.469544 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.479712 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.479812 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.489948 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.490092 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.500199 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.505502 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.510690 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.515895 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.521129 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.521242 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.531392 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.531510 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.541629 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.541749 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.551866 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.551980 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.562110 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.562214 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.572342 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.572455 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.578523 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.588104 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.588180 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.598106 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.603354 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.603443 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.613661 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.613729 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.619519 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.629058 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.629129 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.639320 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.639388 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.644512 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.654711 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.654778 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.664958 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.665068 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.675197 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.675321 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.025000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.685449 kernel: Failed to create system directory sunrpc Dec 13 02:07:02.706764 kernel: RPC: Registered named UNIX socket transport module. Dec 13 02:07:02.706958 kernel: RPC: Registered udp transport module. Dec 13 02:07:02.707000 kernel: RPC: Registered tcp transport module. Dec 13 02:07:02.711282 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 02:07:02.025000 audit[2952]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d401791ad0 a1=1a7f1c a2=55d3f4a312b0 a3=5 items=6 ppid=56 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:02.025000 audit: CWD cwd="/" Dec 13 02:07:02.025000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:02.025000 audit: PATH item=1 name=(null) inode=23664 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:02.025000 audit: PATH item=2 name=(null) inode=23664 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:02.025000 audit: PATH item=3 name=(null) inode=23665 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:02.025000 audit: PATH item=4 name=(null) inode=23664 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:02.025000 audit: PATH item=5 name=(null) inode=23666 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:07:02.025000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.779154 kernel: Failed to create system directory nfs Dec 13 02:07:02.779296 kernel: Failed to create system directory nfs Dec 13 02:07:02.779333 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.788891 kernel: Failed to create system directory nfs Dec 13 02:07:02.789069 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.798626 kernel: Failed to create system directory nfs Dec 13 02:07:02.798753 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.808452 kernel: Failed to create system directory nfs Dec 13 02:07:02.808633 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.818196 kernel: Failed to create system directory nfs Dec 13 02:07:02.818358 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.827988 kernel: Failed to create system directory nfs Dec 13 02:07:02.828106 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.837699 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.842664 kernel: Failed to create system directory nfs Dec 13 02:07:02.842766 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.852414 kernel: Failed to create system directory nfs Dec 13 02:07:02.852496 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.862127 kernel: Failed to create system directory nfs Dec 13 02:07:02.862193 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.871816 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.876909 kernel: Failed to create system directory nfs Dec 13 02:07:02.876984 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.886622 kernel: Failed to create system directory nfs Dec 13 02:07:02.886695 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.896321 kernel: Failed to create system directory nfs Dec 13 02:07:02.896410 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.906013 kernel: Failed to create system directory nfs Dec 13 02:07:02.906204 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.915844 kernel: Failed to create system directory nfs Dec 13 02:07:02.915931 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.925567 kernel: Failed to create system directory nfs Dec 13 02:07:02.925654 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.935267 kernel: Failed to create system directory nfs Dec 13 02:07:02.935354 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.944999 kernel: Failed to create system directory nfs Dec 13 02:07:02.945081 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.954732 kernel: Failed to create system directory nfs Dec 13 02:07:02.954842 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.964445 kernel: Failed to create system directory nfs Dec 13 02:07:02.964535 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.974179 kernel: Failed to create system directory nfs Dec 13 02:07:02.974338 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.983926 kernel: Failed to create system directory nfs Dec 13 02:07:02.984050 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.993627 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.998749 kernel: Failed to create system directory nfs Dec 13 02:07:02.998831 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.008603 kernel: Failed to create system directory nfs Dec 13 02:07:03.008713 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.018388 kernel: Failed to create system directory nfs Dec 13 02:07:03.018609 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.028441 kernel: Failed to create system directory nfs Dec 13 02:07:03.028602 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.038118 kernel: Failed to create system directory nfs Dec 13 02:07:03.038201 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.047851 kernel: Failed to create system directory nfs Dec 13 02:07:03.047950 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.057584 kernel: Failed to create system directory nfs Dec 13 02:07:03.057672 kernel: Failed to create system directory nfs Dec 13 02:07:02.759000 audit[2952]: AVC avc: denied { confidentiality } for pid=2952 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.091578 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 02:07:02.759000 audit[2952]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d4019b2700 a1=16e97c a2=55d3f4a312b0 a3=5 items=0 ppid=56 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:02.759000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.151795 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.151893 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.151952 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.161747 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.161848 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.171628 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.171703 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.181515 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.181695 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.191689 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.191794 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.196397 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.201385 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.206295 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.211275 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.221200 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.221334 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.226256 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.236172 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.236297 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.246039 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.246164 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.255923 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.256012 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.265781 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.265870 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.275835 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.275929 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.280826 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.285818 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.295708 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.295806 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.305046 kubelet[1558]: E1213 02:07:03.304928 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:03.305761 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.305817 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.315500 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.315601 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.325414 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.325605 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.335297 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.335408 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.345294 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.345399 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.355235 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.355335 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.365075 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.365199 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.374953 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.375070 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.384854 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.384952 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.394684 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.394786 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.404597 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.404687 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.414533 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.414632 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.424361 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.424449 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.434268 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.434337 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.444129 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.444231 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.454054 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.454193 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.463913 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.464009 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.473777 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.473900 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.483781 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.483915 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.493918 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.494057 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.498597 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.508472 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.508608 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.518359 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.518502 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.528261 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.528396 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.538433 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.538565 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.548552 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.548650 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.558376 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.558470 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.568312 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.568411 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.578161 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.578296 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.588075 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.588182 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.597916 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.598022 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.128000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.607878 kernel: Failed to create system directory nfs4 Dec 13 02:07:03.786816 kernel: NFS: Registering the id_resolver key type Dec 13 02:07:03.786963 kernel: Key type id_resolver registered Dec 13 02:07:03.787002 kernel: Key type id_legacy registered Dec 13 02:07:03.128000 audit[2958]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb938ab3010 a1=208de4 a2=5623bcd172b0 a3=5 items=0 ppid=56 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:03.128000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.834871 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.835034 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.835079 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.845251 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.845368 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.850586 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.860765 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.860884 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.871078 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.871231 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.881370 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.881563 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.896963 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.897073 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.897137 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.907227 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.907316 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.917466 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.917590 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.927729 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.927843 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.937986 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.938094 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.948243 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.948351 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.819000 audit[2968]: AVC avc: denied { confidentiality } for pid=2968 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:03.958548 kernel: Failed to create system directory rpcgss Dec 13 02:07:03.819000 audit[2968]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2ad19bd010 a1=70af4 a2=559cc7d2b2b0 a3=5 items=0 ppid=56 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:03.819000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 02:07:03.999866 nfsidmap[2988]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 02:07:04.014982 nfsidmap[2989]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 02:07:04.029000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:04.029000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:04.029000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:04.029000 audit[1343]: AVC avc: denied { watch_reads } for pid=1343 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:04.029000 audit[1343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5653db906f60 a2=10 a3=c5223cbb7d5ba4da items=0 ppid=1 pid=1343 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.029000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:07:04.030000 audit[1343]: AVC avc: denied { watch_reads } for pid=1343 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:04.030000 audit[1343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5653db906f60 a2=10 a3=c5223cbb7d5ba4da items=0 ppid=1 pid=1343 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.030000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:07:04.030000 audit[1343]: AVC avc: denied { watch_reads } for pid=1343 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:07:04.030000 audit[1343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5653db906f60 a2=10 a3=c5223cbb7d5ba4da items=0 ppid=1 pid=1343 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.030000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:07:04.129646 env[1218]: time="2024-12-13T02:07:04.129500609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0c44fb82-153a-47b5-9f4e-dddab34b5dbb,Namespace:default,Attempt:0,}" Dec 13 02:07:04.262457 kubelet[1558]: E1213 02:07:04.262412 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:04.276690 systemd-networkd[1024]: cali5ec59c6bf6e: Link UP Dec 13 02:07:04.279648 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:07:04.287527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 02:07:04.288250 systemd-networkd[1024]: cali5ec59c6bf6e: Gained carrier Dec 13 02:07:04.305197 kubelet[1558]: E1213 02:07:04.305148 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:04.309332 env[1218]: time="2024-12-13T02:07:04.309281631Z" level=info msg="StopPodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\"" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.190 [INFO][2990] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.61-k8s-test--pod--1-eth0 default 0c44fb82-153a-47b5-9f4e-dddab34b5dbb 1170 0 2024-12-13 02:06:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.61 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.190 [INFO][2990] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.224 [INFO][3002] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" HandleID="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Workload="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.235 [INFO][3002] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" HandleID="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Workload="10.128.0.61-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318af0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.61", "pod":"test-pod-1", "timestamp":"2024-12-13 02:07:04.224099489 +0000 UTC"}, Hostname:"10.128.0.61", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.235 [INFO][3002] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.235 [INFO][3002] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.235 [INFO][3002] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.61' Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.237 [INFO][3002] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.242 [INFO][3002] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.247 [INFO][3002] ipam/ipam.go 489: Trying affinity for 192.168.81.128/26 host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.250 [INFO][3002] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.253 [INFO][3002] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.128/26 host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.253 [INFO][3002] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.128/26 handle="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.254 [INFO][3002] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.259 [INFO][3002] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.128/26 handle="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.267 [INFO][3002] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.132/26] block=192.168.81.128/26 handle="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.268 [INFO][3002] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.132/26] handle="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" host="10.128.0.61" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.268 [INFO][3002] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.268 [INFO][3002] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.132/26] IPv6=[] ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" HandleID="k8s-pod-network.6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Workload="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.312505 env[1218]: 2024-12-13 02:07:04.269 [INFO][2990] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0c44fb82-153a-47b5-9f4e-dddab34b5dbb", ResourceVersion:"1170", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:04.313779 env[1218]: 2024-12-13 02:07:04.270 [INFO][2990] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.132/32] ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.313779 env[1218]: 2024-12-13 02:07:04.270 [INFO][2990] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.313779 env[1218]: 2024-12-13 02:07:04.289 [INFO][2990] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.313779 env[1218]: 2024-12-13 02:07:04.289 [INFO][2990] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0c44fb82-153a-47b5-9f4e-dddab34b5dbb", ResourceVersion:"1170", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2a:a7:e6:de:17:67", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:04.313779 env[1218]: 2024-12-13 02:07:04.298 [INFO][2990] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.61-k8s-test--pod--1-eth0" Dec 13 02:07:04.327000 audit[3022]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=3022 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:07:04.327000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffd0a3ffda0 a2=0 a3=7ffd0a3ffd8c items=0 ppid=2210 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:07:04.359062 env[1218]: time="2024-12-13T02:07:04.358935120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:07:04.359297 env[1218]: time="2024-12-13T02:07:04.359197597Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:07:04.359297 env[1218]: time="2024-12-13T02:07:04.359263481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:07:04.359617 env[1218]: time="2024-12-13T02:07:04.359553570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e pid=3044 runtime=io.containerd.runc.v2 Dec 13 02:07:04.397324 systemd[1]: Started cri-containerd-6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e.scope. Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.425000 audit: BPF prog-id=129 op=LOAD Dec 13 02:07:04.427000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.427000 audit[3053]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3044 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386135613037646138626134343665336461333131646131633533 Dec 13 02:07:04.429000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.429000 audit[3053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3044 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386135613037646138626134343665336461333131646131633533 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.430000 audit: BPF prog-id=130 op=LOAD Dec 13 02:07:04.430000 audit[3053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f0990 items=0 ppid=3044 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386135613037646138626134343665336461333131646131633533 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.431000 audit: BPF prog-id=131 op=LOAD Dec 13 02:07:04.431000 audit[3053]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f09d8 items=0 ppid=3044 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386135613037646138626134343665336461333131646131633533 Dec 13 02:07:04.433000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:07:04.434000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.434000 audit: BPF prog-id=132 op=LOAD Dec 13 02:07:04.434000 audit[3053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f0de8 items=0 ppid=3044 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386135613037646138626134343665336461333131646131633533 Dec 13 02:07:04.488922 env[1218]: time="2024-12-13T02:07:04.488843892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0c44fb82-153a-47b5-9f4e-dddab34b5dbb,Namespace:default,Attempt:0,} returns sandbox id \"6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e\"" Dec 13 02:07:04.493999 env[1218]: time="2024-12-13T02:07:04.493949989Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.388 [WARNING][3034] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-csi--node--driver--x874n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e26474d-f57f-4a66-bed6-df9a23cb190c", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069", Pod:"csi-node-driver-x874n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali84bc8ec6881", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.388 [INFO][3034] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.388 [INFO][3034] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" iface="eth0" netns="" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.389 [INFO][3034] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.389 [INFO][3034] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.497 [INFO][3063] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.497 [INFO][3063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.497 [INFO][3063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.505 [WARNING][3063] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.505 [INFO][3063] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.507 [INFO][3063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:04.509647 env[1218]: 2024-12-13 02:07:04.508 [INFO][3034] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.510659 env[1218]: time="2024-12-13T02:07:04.510612037Z" level=info msg="TearDown network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" successfully" Dec 13 02:07:04.510792 env[1218]: time="2024-12-13T02:07:04.510765748Z" level=info msg="StopPodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" returns successfully" Dec 13 02:07:04.511655 env[1218]: time="2024-12-13T02:07:04.511617644Z" level=info msg="RemovePodSandbox for \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\"" Dec 13 02:07:04.511896 env[1218]: time="2024-12-13T02:07:04.511839876Z" level=info msg="Forcibly stopping sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\"" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.567 [WARNING][3104] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-csi--node--driver--x874n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2e26474d-f57f-4a66-bed6-df9a23cb190c", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"527bf4a515af1c562e29762bfda6ef4f12ab8f5682f5faff0335207383fa3069", Pod:"csi-node-driver-x874n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali84bc8ec6881", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.568 [INFO][3104] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.568 [INFO][3104] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" iface="eth0" netns="" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.568 [INFO][3104] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.568 [INFO][3104] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.594 [INFO][3111] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.594 [INFO][3111] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.594 [INFO][3111] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.602 [WARNING][3111] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.602 [INFO][3111] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" HandleID="k8s-pod-network.2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Workload="10.128.0.61-k8s-csi--node--driver--x874n-eth0" Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.604 [INFO][3111] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:04.606973 env[1218]: 2024-12-13 02:07:04.605 [INFO][3104] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949" Dec 13 02:07:04.607703 env[1218]: time="2024-12-13T02:07:04.607633017Z" level=info msg="TearDown network for sandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" successfully" Dec 13 02:07:04.611538 env[1218]: time="2024-12-13T02:07:04.611459481Z" level=info msg="RemovePodSandbox \"2f7d1228e379721733f2868a9c7be5313972fdd86b8c328cce5b48033fa5a949\" returns successfully" Dec 13 02:07:04.612260 env[1218]: time="2024-12-13T02:07:04.612211138Z" level=info msg="StopPodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\"" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.658 [WARNING][3129] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b65bb69b-e938-4cf4-917f-41e147ddf684", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a", Pod:"nginx-deployment-6d5f899847-2nnhw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1b1294ba77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.659 [INFO][3129] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.659 [INFO][3129] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" iface="eth0" netns="" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.659 [INFO][3129] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.659 [INFO][3129] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.686 [INFO][3135] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.687 [INFO][3135] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.687 [INFO][3135] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.696 [WARNING][3135] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.696 [INFO][3135] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.698 [INFO][3135] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:04.700643 env[1218]: 2024-12-13 02:07:04.699 [INFO][3129] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.704576 env[1218]: time="2024-12-13T02:07:04.704471532Z" level=info msg="TearDown network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" successfully" Dec 13 02:07:04.704576 env[1218]: time="2024-12-13T02:07:04.704572194Z" level=info msg="StopPodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" returns successfully" Dec 13 02:07:04.705306 env[1218]: time="2024-12-13T02:07:04.705259999Z" level=info msg="RemovePodSandbox for \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\"" Dec 13 02:07:04.705415 env[1218]: time="2024-12-13T02:07:04.705314218Z" level=info msg="Forcibly stopping sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\"" Dec 13 02:07:04.711721 env[1218]: time="2024-12-13T02:07:04.711655524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:04.715029 env[1218]: time="2024-12-13T02:07:04.714961994Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:07:04.715561 env[1218]: time="2024-12-13T02:07:04.715516959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:04.718041 env[1218]: time="2024-12-13T02:07:04.717018877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:04.718350 env[1218]: time="2024-12-13T02:07:04.718313778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:07:04.721227 env[1218]: time="2024-12-13T02:07:04.721177119Z" level=info msg="CreateContainer within sandbox \"6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 02:07:04.745450 env[1218]: time="2024-12-13T02:07:04.745376063Z" level=info msg="CreateContainer within sandbox \"6f8a5a07da8ba446e3da311da1c538761bc91d1b63007fb018b4bd225be0569e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b2da15ea04504e7b04a5aa1190682d1c29adecbb9bb884ef3aab3d9c30e77003\"" Dec 13 02:07:04.746400 env[1218]: time="2024-12-13T02:07:04.746356109Z" level=info msg="StartContainer for \"b2da15ea04504e7b04a5aa1190682d1c29adecbb9bb884ef3aab3d9c30e77003\"" Dec 13 02:07:04.783162 systemd[1]: Started cri-containerd-b2da15ea04504e7b04a5aa1190682d1c29adecbb9bb884ef3aab3d9c30e77003.scope. Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.816000 audit: BPF prog-id=133 op=LOAD Dec 13 02:07:04.818000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.818000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3044 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232646131356561303435303465376230346135616131313930363832 Dec 13 02:07:04.818000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.818000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3044 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232646131356561303435303465376230346135616131313930363832 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.819000 audit: BPF prog-id=134 op=LOAD Dec 13 02:07:04.819000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018b270 items=0 ppid=3044 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232646131356561303435303465376230346135616131313930363832 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.820000 audit: BPF prog-id=135 op=LOAD Dec 13 02:07:04.820000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018b2b8 items=0 ppid=3044 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232646131356561303435303465376230346135616131313930363832 Dec 13 02:07:04.821000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:07:04.822000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:04.822000 audit: BPF prog-id=136 op=LOAD Dec 13 02:07:04.822000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00018b6c8 items=0 ppid=3044 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:04.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232646131356561303435303465376230346135616131313930363832 Dec 13 02:07:04.854047 env[1218]: time="2024-12-13T02:07:04.853975984Z" level=info msg="StartContainer for \"b2da15ea04504e7b04a5aa1190682d1c29adecbb9bb884ef3aab3d9c30e77003\" returns successfully" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.807 [WARNING][3155] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b65bb69b-e938-4cf4-917f-41e147ddf684", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 6, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.61", ContainerID:"f5d076b2646658aceb0a3a393d25b167cf62601d36b336636752fc38249b603a", Pod:"nginx-deployment-6d5f899847-2nnhw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib1b1294ba77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.807 [INFO][3155] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.807 [INFO][3155] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" iface="eth0" netns="" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.807 [INFO][3155] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.807 [INFO][3155] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.860 [INFO][3186] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.861 [INFO][3186] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.861 [INFO][3186] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.869 [WARNING][3186] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.870 [INFO][3186] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" HandleID="k8s-pod-network.a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Workload="10.128.0.61-k8s-nginx--deployment--6d5f899847--2nnhw-eth0" Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.871 [INFO][3186] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:04.875588 env[1218]: 2024-12-13 02:07:04.873 [INFO][3155] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538" Dec 13 02:07:04.875588 env[1218]: time="2024-12-13T02:07:04.875606931Z" level=info msg="TearDown network for sandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" successfully" Dec 13 02:07:04.881466 env[1218]: time="2024-12-13T02:07:04.881365459Z" level=info msg="RemovePodSandbox \"a44067965b990a2000ac09811c28b6a3bfd67f16e756e20f90a39564074ec538\" returns successfully" Dec 13 02:07:05.306339 kubelet[1558]: E1213 02:07:05.306244 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:05.742554 kubelet[1558]: I1213 02:07:05.742380 1558 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.519065846 podStartE2EDuration="19.742323055s" podCreationTimestamp="2024-12-13 02:06:46 +0000 UTC" firstStartedPulling="2024-12-13 02:07:04.493269602 +0000 UTC m=+60.869255918" lastFinishedPulling="2024-12-13 02:07:04.716526793 +0000 UTC m=+61.092513127" observedRunningTime="2024-12-13 02:07:05.742159411 +0000 UTC m=+62.118145747" watchObservedRunningTime="2024-12-13 02:07:05.742323055 +0000 UTC m=+62.118309396" Dec 13 02:07:05.839946 systemd-networkd[1024]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 02:07:06.306609 kubelet[1558]: E1213 02:07:06.306546 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:07.307038 kubelet[1558]: E1213 02:07:07.306977 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:08.307544 kubelet[1558]: E1213 02:07:08.307492 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:09.307778 kubelet[1558]: E1213 02:07:09.307701 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:10.308339 kubelet[1558]: E1213 02:07:10.308270 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:11.308889 kubelet[1558]: E1213 02:07:11.308820 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:07:12.309525 kubelet[1558]: E1213 02:07:12.309435 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"