Dec 13 14:24:09.133628 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:24:09.133676 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:09.133694 kernel: BIOS-provided physical RAM map: Dec 13 14:24:09.133707 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:24:09.133719 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:24:09.133732 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:24:09.133752 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:24:09.133766 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:24:09.133779 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:24:09.133792 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:24:09.133805 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:24:09.133819 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:24:09.133832 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:24:09.133845 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:24:09.133866 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:24:09.133882 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:24:09.133896 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:24:09.133910 kernel: NX (Execute Disable) protection: active Dec 13 14:24:09.133924 kernel: efi: EFI v2.70 by EDK II Dec 13 14:24:09.133939 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:24:09.133954 kernel: random: crng init done Dec 13 14:24:09.133968 kernel: SMBIOS 2.4 present. Dec 13 14:24:09.133987 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:24:09.134001 kernel: Hypervisor detected: KVM Dec 13 14:24:09.134016 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:24:09.134032 kernel: kvm-clock: cpu 0, msr 1d319a001, primary cpu clock Dec 13 14:24:09.134046 kernel: kvm-clock: using sched offset of 13418795796 cycles Dec 13 14:24:09.134062 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:24:09.134078 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:24:09.134092 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:24:09.134107 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:24:09.134122 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:24:09.134142 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:24:09.134156 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:24:09.134171 kernel: Using GB pages for direct mapping Dec 13 14:24:09.134240 kernel: Secure boot disabled Dec 13 14:24:09.134258 kernel: ACPI: Early table checksum verification disabled Dec 13 14:24:09.134273 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:24:09.134288 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:24:09.134304 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:24:09.134331 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:24:09.134347 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:24:09.134363 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:24:09.134379 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:24:09.134395 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:24:09.134411 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:24:09.134431 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:24:09.134447 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:24:09.134471 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:24:09.134487 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:24:09.134503 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:24:09.134519 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:24:09.134534 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:24:09.134551 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:24:09.134566 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:24:09.134585 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:24:09.134602 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:24:09.134617 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:24:09.134634 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:24:09.134650 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:24:09.134666 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:24:09.134682 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:24:09.134697 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:24:09.134713 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:24:09.134731 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 14:24:09.134746 kernel: Zone ranges: Dec 13 14:24:09.134762 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:24:09.134777 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:24:09.134791 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:24:09.134806 kernel: Movable zone start for each node Dec 13 14:24:09.134820 kernel: Early memory node ranges Dec 13 14:24:09.134836 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:24:09.134851 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:24:09.134870 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:24:09.134885 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:24:09.134901 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:24:09.134916 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:24:09.134932 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:24:09.134948 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:24:09.134965 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:24:09.134982 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:24:09.134998 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:24:09.135020 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:24:09.135037 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:24:09.135054 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:24:09.135070 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:24:09.135087 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:24:09.135104 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:24:09.135121 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:24:09.135137 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:24:09.135154 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:24:09.135175 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:24:09.136249 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:24:09.136283 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:24:09.136300 kernel: Booting paravirtualized kernel on KVM Dec 13 14:24:09.136316 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:24:09.136333 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:24:09.136349 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:24:09.136366 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:24:09.136382 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:24:09.136404 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:24:09.136421 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:24:09.136437 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:24:09.136462 kernel: Policy zone: Normal Dec 13 14:24:09.136480 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:09.136497 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:24:09.136513 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:24:09.136529 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:24:09.136546 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:24:09.136567 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344876K reserved, 0K cma-reserved) Dec 13 14:24:09.136583 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:24:09.136600 kernel: Kernel/User page tables isolation: enabled Dec 13 14:24:09.136617 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:24:09.136633 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:24:09.136650 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:24:09.136668 kernel: rcu: RCU event tracing is enabled. Dec 13 14:24:09.136685 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:24:09.136705 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:24:09.136735 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:24:09.136752 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:24:09.136772 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:24:09.136789 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:24:09.136806 kernel: Console: colour dummy device 80x25 Dec 13 14:24:09.136823 kernel: printk: console [ttyS0] enabled Dec 13 14:24:09.136840 kernel: ACPI: Core revision 20210730 Dec 13 14:24:09.136858 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:24:09.136876 kernel: x2apic enabled Dec 13 14:24:09.136897 kernel: Switched APIC routing to physical x2apic. Dec 13 14:24:09.136914 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:24:09.136932 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:24:09.136949 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:24:09.136967 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:24:09.136984 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:24:09.137001 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:24:09.137020 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:24:09.137037 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:24:09.137054 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:24:09.137071 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:24:09.137089 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:24:09.137106 kernel: RETBleed: Mitigation: IBRS Dec 13 14:24:09.137122 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:24:09.137140 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:24:09.137158 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:24:09.137180 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:24:09.137214 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:24:09.137230 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:24:09.137247 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:24:09.137263 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:24:09.137279 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:24:09.137296 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:24:09.137313 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:24:09.137329 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:24:09.137350 kernel: LSM: Security Framework initializing Dec 13 14:24:09.137366 kernel: SELinux: Initializing. Dec 13 14:24:09.137383 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:24:09.137400 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:24:09.137416 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:24:09.137433 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:24:09.137459 kernel: signal: max sigframe size: 1776 Dec 13 14:24:09.137476 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:24:09.137492 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:24:09.137512 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:24:09.137529 kernel: x86: Booting SMP configuration: Dec 13 14:24:09.137546 kernel: .... node #0, CPUs: #1 Dec 13 14:24:09.137563 kernel: kvm-clock: cpu 1, msr 1d319a041, secondary cpu clock Dec 13 14:24:09.137581 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:24:09.137599 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:24:09.137616 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:24:09.137634 kernel: smpboot: Max logical packages: 1 Dec 13 14:24:09.137654 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:24:09.137671 kernel: devtmpfs: initialized Dec 13 14:24:09.137689 kernel: x86/mm: Memory block size: 128MB Dec 13 14:24:09.137705 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:24:09.137722 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:24:09.137739 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:24:09.137756 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:24:09.137773 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:24:09.137790 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:24:09.137811 kernel: audit: type=2000 audit(1734099847.877:1): state=initialized audit_enabled=0 res=1 Dec 13 14:24:09.137828 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:24:09.137846 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:24:09.137863 kernel: cpuidle: using governor menu Dec 13 14:24:09.137880 kernel: ACPI: bus type PCI registered Dec 13 14:24:09.137897 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:24:09.137914 kernel: dca service started, version 1.12.1 Dec 13 14:24:09.137932 kernel: PCI: Using configuration type 1 for base access Dec 13 14:24:09.137949 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:24:09.137970 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:24:09.137988 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:24:09.138006 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:24:09.138023 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:24:09.138040 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:24:09.138054 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:24:09.138070 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:24:09.138086 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:24:09.138102 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:24:09.138122 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:24:09.138137 kernel: ACPI: Interpreter enabled Dec 13 14:24:09.138153 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:24:09.138169 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:24:09.138185 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:24:09.138216 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:24:09.138232 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:24:09.138491 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:24:09.138673 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:24:09.138696 kernel: PCI host bridge to bus 0000:00 Dec 13 14:24:09.138862 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:24:09.139012 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:24:09.139162 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:24:09.143432 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:24:09.143611 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:24:09.143799 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:24:09.143970 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:24:09.144139 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:24:09.144316 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:24:09.144499 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:24:09.144658 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:24:09.144824 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:24:09.144995 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:24:09.145154 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:24:09.145329 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:24:09.145503 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:24:09.145661 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:24:09.145818 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:24:09.145844 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:24:09.145861 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:24:09.145878 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:24:09.145895 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:24:09.145912 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:24:09.145929 kernel: iommu: Default domain type: Translated Dec 13 14:24:09.145946 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:24:09.145963 kernel: vgaarb: loaded Dec 13 14:24:09.145980 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:24:09.146000 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:24:09.146017 kernel: PTP clock support registered Dec 13 14:24:09.146034 kernel: Registered efivars operations Dec 13 14:24:09.146051 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:24:09.146067 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:24:09.146084 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:24:09.146101 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:24:09.146117 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:24:09.146133 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:24:09.146153 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:24:09.146170 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:24:09.146199 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:24:09.146216 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:24:09.146232 kernel: pnp: PnP ACPI init Dec 13 14:24:09.146248 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:24:09.146265 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:24:09.146282 kernel: NET: Registered PF_INET protocol family Dec 13 14:24:09.146299 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:24:09.146320 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:24:09.146336 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:24:09.146354 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:24:09.146370 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:24:09.146387 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:24:09.146404 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:24:09.146421 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:24:09.146437 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:24:09.146465 kernel: NET: Registered PF_XDP protocol family Dec 13 14:24:09.146611 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:24:09.146755 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:24:09.146893 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:24:09.147037 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:24:09.151306 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:24:09.151346 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:24:09.151371 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:24:09.151387 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:24:09.151402 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:24:09.151418 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:24:09.151432 kernel: clocksource: Switched to clocksource tsc Dec 13 14:24:09.151454 kernel: Initialise system trusted keyrings Dec 13 14:24:09.151470 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:24:09.151487 kernel: Key type asymmetric registered Dec 13 14:24:09.151503 kernel: Asymmetric key parser 'x509' registered Dec 13 14:24:09.151525 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:24:09.151540 kernel: io scheduler mq-deadline registered Dec 13 14:24:09.151555 kernel: io scheduler kyber registered Dec 13 14:24:09.151572 kernel: io scheduler bfq registered Dec 13 14:24:09.151589 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:24:09.151608 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:24:09.151817 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:24:09.151840 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:24:09.152016 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:24:09.152043 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:24:09.152231 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:24:09.152254 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:24:09.152271 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:24:09.152288 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:24:09.152304 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:24:09.152322 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:24:09.155411 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:24:09.155546 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:24:09.155579 kernel: i8042: Warning: Keylock active Dec 13 14:24:09.155598 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:24:09.155615 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:24:09.155841 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:24:09.156000 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:24:09.156158 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:24:08 UTC (1734099848) Dec 13 14:24:09.156341 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:24:09.156374 kernel: intel_pstate: CPU model not supported Dec 13 14:24:09.156394 kernel: pstore: Registered efi as persistent store backend Dec 13 14:24:09.156411 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:24:09.156429 kernel: Segment Routing with IPv6 Dec 13 14:24:09.156448 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:24:09.156467 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:24:09.156485 kernel: Key type dns_resolver registered Dec 13 14:24:09.156503 kernel: IPI shorthand broadcast: enabled Dec 13 14:24:09.156521 kernel: sched_clock: Marking stable (764123112, 167059349)->(994829144, -63646683) Dec 13 14:24:09.156544 kernel: registered taskstats version 1 Dec 13 14:24:09.156562 kernel: Loading compiled-in X.509 certificates Dec 13 14:24:09.156581 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:24:09.156600 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:24:09.156619 kernel: Key type .fscrypt registered Dec 13 14:24:09.156637 kernel: Key type fscrypt-provisioning registered Dec 13 14:24:09.156664 kernel: pstore: Using crash dump compression: deflate Dec 13 14:24:09.156682 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:24:09.156700 kernel: ima: No architecture policies found Dec 13 14:24:09.156722 kernel: clk: Disabling unused clocks Dec 13 14:24:09.156741 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:24:09.156759 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:24:09.156777 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:24:09.156796 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:24:09.156814 kernel: Run /init as init process Dec 13 14:24:09.156832 kernel: with arguments: Dec 13 14:24:09.156850 kernel: /init Dec 13 14:24:09.156868 kernel: with environment: Dec 13 14:24:09.156890 kernel: HOME=/ Dec 13 14:24:09.156908 kernel: TERM=linux Dec 13 14:24:09.156925 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:24:09.156947 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:24:09.156969 systemd[1]: Detected virtualization kvm. Dec 13 14:24:09.156989 systemd[1]: Detected architecture x86-64. Dec 13 14:24:09.157008 systemd[1]: Running in initrd. Dec 13 14:24:09.157030 systemd[1]: No hostname configured, using default hostname. Dec 13 14:24:09.157049 systemd[1]: Hostname set to . Dec 13 14:24:09.157069 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:24:09.157087 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:24:09.157106 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:24:09.157125 systemd[1]: Reached target cryptsetup.target. Dec 13 14:24:09.157144 systemd[1]: Reached target paths.target. Dec 13 14:24:09.157163 systemd[1]: Reached target slices.target. Dec 13 14:24:09.157185 systemd[1]: Reached target swap.target. Dec 13 14:24:09.157218 systemd[1]: Reached target timers.target. Dec 13 14:24:09.157238 systemd[1]: Listening on iscsid.socket. Dec 13 14:24:09.157257 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:24:09.157276 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:24:09.157295 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:24:09.157315 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:24:09.157334 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:24:09.157356 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:24:09.157376 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:24:09.157415 systemd[1]: Reached target sockets.target. Dec 13 14:24:09.157439 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:24:09.157458 systemd[1]: Finished network-cleanup.service. Dec 13 14:24:09.157478 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:24:09.157497 systemd[1]: Starting systemd-journald.service... Dec 13 14:24:09.157521 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:24:09.157538 kernel: audit: type=1334 audit(1734099849.121:2): prog-id=6 op=LOAD Dec 13 14:24:09.157557 systemd[1]: Starting systemd-resolved.service... Dec 13 14:24:09.157577 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:24:09.157597 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:24:09.157617 kernel: audit: type=1130 audit(1734099849.142:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.157636 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:24:09.157669 systemd-journald[189]: Journal started Dec 13 14:24:09.157768 systemd-journald[189]: Runtime Journal (/run/log/journal/0598279b92dc44dabe8acc384a45279a) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:24:09.121000 audit: BPF prog-id=6 op=LOAD Dec 13 14:24:09.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.164091 systemd[1]: Started systemd-journald.service. Dec 13 14:24:09.164174 kernel: audit: type=1130 audit(1734099849.157:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.164503 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 14:24:09.175337 kernel: audit: type=1130 audit(1734099849.165:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.184779 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:24:09.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.199101 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:24:09.199699 kernel: audit: type=1130 audit(1734099849.193:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.203879 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:24:09.219954 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:24:09.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.227212 kernel: audit: type=1130 audit(1734099849.219:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.228951 systemd-resolved[191]: Positive Trust Anchors: Dec 13 14:24:09.229502 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:24:09.229784 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:24:09.241786 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 14:24:09.244298 systemd[1]: Started systemd-resolved.service. Dec 13 14:24:09.262368 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:24:09.262408 kernel: audit: type=1130 audit(1734099849.247:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.262444 kernel: audit: type=1130 audit(1734099849.252:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.262466 kernel: Bridge firewalling registered Dec 13 14:24:09.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.249625 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:24:09.258534 systemd[1]: Reached target nss-lookup.target. Dec 13 14:24:09.263568 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 14:24:09.278733 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:24:09.294219 kernel: SCSI subsystem initialized Dec 13 14:24:09.295590 dracut-cmdline[207]: dracut-dracut-053 Dec 13 14:24:09.299937 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:09.317306 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:24:09.317386 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:24:09.319867 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:24:09.324773 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 14:24:09.326055 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:24:09.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.334576 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:24:09.346336 kernel: audit: type=1130 audit(1734099849.332:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.354881 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:24:09.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.397228 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:24:09.417227 kernel: iscsi: registered transport (tcp) Dec 13 14:24:09.444613 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:24:09.444698 kernel: QLogic iSCSI HBA Driver Dec 13 14:24:09.491344 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:24:09.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.497056 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:24:09.554262 kernel: raid6: avx2x4 gen() 18080 MB/s Dec 13 14:24:09.571232 kernel: raid6: avx2x4 xor() 6909 MB/s Dec 13 14:24:09.588219 kernel: raid6: avx2x2 gen() 18014 MB/s Dec 13 14:24:09.609236 kernel: raid6: avx2x2 xor() 18624 MB/s Dec 13 14:24:09.630238 kernel: raid6: avx2x1 gen() 13940 MB/s Dec 13 14:24:09.651235 kernel: raid6: avx2x1 xor() 16189 MB/s Dec 13 14:24:09.672230 kernel: raid6: sse2x4 gen() 11068 MB/s Dec 13 14:24:09.693232 kernel: raid6: sse2x4 xor() 6555 MB/s Dec 13 14:24:09.714267 kernel: raid6: sse2x2 gen() 12046 MB/s Dec 13 14:24:09.735271 kernel: raid6: sse2x2 xor() 7421 MB/s Dec 13 14:24:09.756246 kernel: raid6: sse2x1 gen() 10488 MB/s Dec 13 14:24:09.782283 kernel: raid6: sse2x1 xor() 5184 MB/s Dec 13 14:24:09.782382 kernel: raid6: using algorithm avx2x4 gen() 18080 MB/s Dec 13 14:24:09.782407 kernel: raid6: .... xor() 6909 MB/s, rmw enabled Dec 13 14:24:09.787519 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:24:09.813244 kernel: xor: automatically using best checksumming function avx Dec 13 14:24:09.925229 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:24:09.937093 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:24:09.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.951000 audit: BPF prog-id=7 op=LOAD Dec 13 14:24:09.951000 audit: BPF prog-id=8 op=LOAD Dec 13 14:24:09.953724 systemd[1]: Starting systemd-udevd.service... Dec 13 14:24:09.971076 systemd-udevd[389]: Using default interface naming scheme 'v252'. Dec 13 14:24:09.978272 systemd[1]: Started systemd-udevd.service. Dec 13 14:24:09.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.998526 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:24:10.015417 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 14:24:10.052317 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:24:10.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:10.053706 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:24:10.121931 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:24:10.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:10.201214 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:24:10.265016 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:24:10.311929 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:24:10.312013 kernel: AES CTR mode by8 optimization enabled Dec 13 14:24:10.312048 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:24:10.382750 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:24:10.442953 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:24:10.443228 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:24:10.443464 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:24:10.443668 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:24:10.443878 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:24:10.443904 kernel: GPT:17805311 != 25165823 Dec 13 14:24:10.443927 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:24:10.443949 kernel: GPT:17805311 != 25165823 Dec 13 14:24:10.443970 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:24:10.443992 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:10.444022 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:24:10.494476 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:24:10.512510 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (432) Dec 13 14:24:10.527126 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:24:10.541523 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:24:10.555379 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:24:10.589415 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:24:10.599513 systemd[1]: Starting disk-uuid.service... Dec 13 14:24:10.624520 disk-uuid[515]: Primary Header is updated. Dec 13 14:24:10.624520 disk-uuid[515]: Secondary Entries is updated. Dec 13 14:24:10.624520 disk-uuid[515]: Secondary Header is updated. Dec 13 14:24:10.650323 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:10.658216 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:11.680239 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:11.680316 disk-uuid[516]: The operation has completed successfully. Dec 13 14:24:11.746495 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:24:11.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:11.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:11.746650 systemd[1]: Finished disk-uuid.service. Dec 13 14:24:11.768310 systemd[1]: Starting verity-setup.service... Dec 13 14:24:11.797714 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:24:11.881762 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:24:11.883384 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:24:11.903723 systemd[1]: Finished verity-setup.service. Dec 13 14:24:11.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:11.987244 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:24:11.987539 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:24:11.987942 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:24:12.053372 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:12.053412 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:24:12.053444 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:24:12.053466 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:24:11.988955 systemd[1]: Starting ignition-setup.service... Dec 13 14:24:12.016177 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:24:12.063594 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:24:12.080166 systemd[1]: Finished ignition-setup.service. Dec 13 14:24:12.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.082007 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:24:12.134833 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:24:12.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.143000 audit: BPF prog-id=9 op=LOAD Dec 13 14:24:12.145423 systemd[1]: Starting systemd-networkd.service... Dec 13 14:24:12.178233 systemd-networkd[690]: lo: Link UP Dec 13 14:24:12.178245 systemd-networkd[690]: lo: Gained carrier Dec 13 14:24:12.179048 systemd-networkd[690]: Enumeration completed Dec 13 14:24:12.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.179444 systemd-networkd[690]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:24:12.179670 systemd[1]: Started systemd-networkd.service. Dec 13 14:24:12.181768 systemd-networkd[690]: eth0: Link UP Dec 13 14:24:12.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.181777 systemd-networkd[690]: eth0: Gained carrier Dec 13 14:24:12.261335 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:24:12.261335 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:24:12.261335 iscsid[699]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:24:12.261335 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:24:12.261335 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:24:12.261335 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:24:12.261335 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:24:12.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.191359 systemd-networkd[690]: eth0: DHCPv4 address 10.128.0.71/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:24:12.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.366709 ignition[640]: Ignition 2.14.0 Dec 13 14:24:12.192954 systemd[1]: Reached target network.target. Dec 13 14:24:12.366723 ignition[640]: Stage: fetch-offline Dec 13 14:24:12.216900 systemd[1]: Starting iscsiuio.service... Dec 13 14:24:12.366794 ignition[640]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:12.226648 systemd[1]: Started iscsiuio.service. Dec 13 14:24:12.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.366839 ignition[640]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:12.247960 systemd[1]: Starting iscsid.service... Dec 13 14:24:12.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.390735 ignition[640]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:12.334706 systemd[1]: Started iscsid.service. Dec 13 14:24:12.390956 ignition[640]: parsed url from cmdline: "" Dec 13 14:24:12.345902 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:24:12.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.390961 ignition[640]: no config URL provided Dec 13 14:24:12.365280 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:24:12.390969 ignition[640]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:24:12.386699 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:24:12.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.390980 ignition[640]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:24:12.395457 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:24:12.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.390989 ignition[640]: failed to fetch config: resource requires networking Dec 13 14:24:12.416489 systemd[1]: Reached target remote-fs.target. Dec 13 14:24:12.391424 ignition[640]: Ignition finished successfully Dec 13 14:24:12.431646 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:24:12.503499 ignition[715]: Ignition 2.14.0 Dec 13 14:24:12.451733 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:24:12.503511 ignition[715]: Stage: fetch Dec 13 14:24:12.475865 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:24:12.503667 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:12.491942 systemd[1]: Starting ignition-fetch.service... Dec 13 14:24:12.503710 ignition[715]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:12.521118 unknown[715]: fetched base config from "system" Dec 13 14:24:12.512429 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:12.521130 unknown[715]: fetched base config from "system" Dec 13 14:24:12.512649 ignition[715]: parsed url from cmdline: "" Dec 13 14:24:12.521139 unknown[715]: fetched user config from "gcp" Dec 13 14:24:12.512657 ignition[715]: no config URL provided Dec 13 14:24:12.523518 systemd[1]: Finished ignition-fetch.service. Dec 13 14:24:12.512667 ignition[715]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:24:12.533656 systemd[1]: Starting ignition-kargs.service... Dec 13 14:24:12.512683 ignition[715]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:24:12.561763 systemd[1]: Finished ignition-kargs.service. Dec 13 14:24:12.512723 ignition[715]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:24:12.580683 systemd[1]: Starting ignition-disks.service... Dec 13 14:24:12.518212 ignition[715]: GET result: OK Dec 13 14:24:12.601909 systemd[1]: Finished ignition-disks.service. Dec 13 14:24:12.518302 ignition[715]: parsing config with SHA512: 47a0c0e671bcd425bb78c6bf9c8d2fed8622b1774800dc353007f6a2ff645c801e4f46dabe9fb7c6ee3cd72a542e1fbc06c02756989a5a963c0074d05f558494 Dec 13 14:24:12.612581 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:24:12.521767 ignition[715]: fetch: fetch complete Dec 13 14:24:12.630405 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:24:12.521773 ignition[715]: fetch: fetch passed Dec 13 14:24:12.630491 systemd[1]: Reached target local-fs.target. Dec 13 14:24:12.521826 ignition[715]: Ignition finished successfully Dec 13 14:24:12.653394 systemd[1]: Reached target sysinit.target. Dec 13 14:24:12.546905 ignition[721]: Ignition 2.14.0 Dec 13 14:24:12.666393 systemd[1]: Reached target basic.target. Dec 13 14:24:12.546915 ignition[721]: Stage: kargs Dec 13 14:24:12.680664 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:24:12.547085 ignition[721]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:12.547116 ignition[721]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:12.555001 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:12.556256 ignition[721]: kargs: kargs passed Dec 13 14:24:12.556313 ignition[721]: Ignition finished successfully Dec 13 14:24:12.592360 ignition[727]: Ignition 2.14.0 Dec 13 14:24:12.592370 ignition[727]: Stage: disks Dec 13 14:24:12.592509 ignition[727]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:12.592539 ignition[727]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:12.599791 ignition[727]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:12.600904 ignition[727]: disks: disks passed Dec 13 14:24:12.600954 ignition[727]: Ignition finished successfully Dec 13 14:24:12.716570 systemd-fsck[735]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:24:12.935171 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:24:12.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.945647 systemd[1]: Mounting sysroot.mount... Dec 13 14:24:12.976362 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:24:12.976681 systemd[1]: Mounted sysroot.mount. Dec 13 14:24:12.977025 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:24:13.003301 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:24:13.021851 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:24:13.021931 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:24:13.021982 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:24:13.042970 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:24:13.061721 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:24:13.124413 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (741) Dec 13 14:24:13.124456 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:13.124481 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:24:13.124504 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:24:13.124524 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:24:13.109671 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:24:13.134580 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:24:13.156453 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:24:13.166351 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:24:13.176342 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:24:13.186587 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:24:13.223023 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:24:13.262367 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:24:13.262418 kernel: audit: type=1130 audit(1734099853.222:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.230261 systemd[1]: Starting ignition-mount.service... Dec 13 14:24:13.270543 systemd[1]: Starting sysroot-boot.service... Dec 13 14:24:13.286841 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:24:13.287002 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:24:13.315337 ignition[807]: INFO : Ignition 2.14.0 Dec 13 14:24:13.315337 ignition[807]: INFO : Stage: mount Dec 13 14:24:13.315337 ignition[807]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:13.315337 ignition[807]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:13.412398 kernel: audit: type=1130 audit(1734099853.334:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.412444 kernel: audit: type=1130 audit(1734099853.365:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.322474 systemd[1]: Finished sysroot-boot.service. Dec 13 14:24:13.426367 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:13.426367 ignition[807]: INFO : mount: mount passed Dec 13 14:24:13.426367 ignition[807]: INFO : Ignition finished successfully Dec 13 14:24:13.491435 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (816) Dec 13 14:24:13.491477 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:13.491493 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:24:13.491508 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:24:13.491530 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:24:13.335731 systemd[1]: Finished ignition-mount.service. Dec 13 14:24:13.368013 systemd[1]: Starting ignition-files.service... Dec 13 14:24:13.423530 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:24:13.522346 ignition[835]: INFO : Ignition 2.14.0 Dec 13 14:24:13.522346 ignition[835]: INFO : Stage: files Dec 13 14:24:13.522346 ignition[835]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:13.522346 ignition[835]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:13.522346 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:13.588333 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (837) Dec 13 14:24:13.485454 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:24:13.597380 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:24:13.597380 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:24:13.597380 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:24:13.597380 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:24:13.597380 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:24:13.597380 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1967125719" Dec 13 14:24:13.597380 ignition[835]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1967125719": device or resource busy Dec 13 14:24:13.597380 ignition[835]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1967125719", trying btrfs: device or resource busy Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1967125719" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1967125719" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1967125719" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1967125719" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:24:13.597380 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:24:13.526543 systemd-networkd[690]: eth0: Gained IPv6LL Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem683521015" Dec 13 14:24:13.861414 ignition[835]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem683521015": device or resource busy Dec 13 14:24:13.861414 ignition[835]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem683521015", trying btrfs: device or resource busy Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem683521015" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem683521015" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem683521015" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem683521015" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:24:13.861414 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:24:13.540236 unknown[835]: wrote ssh authorized keys file for user: core Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244688181" Dec 13 14:24:14.111384 ignition[835]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244688181": device or resource busy Dec 13 14:24:14.111384 ignition[835]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1244688181", trying btrfs: device or resource busy Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244688181" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1244688181" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1244688181" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1244688181" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:14.111384 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem197673068" Dec 13 14:24:14.362397 ignition[835]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem197673068": device or resource busy Dec 13 14:24:14.362397 ignition[835]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem197673068", trying btrfs: device or resource busy Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem197673068" Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem197673068" Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem197673068" Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem197673068" Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:24:14.362397 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Dec 13 14:24:14.576399 kernel: audit: type=1130 audit(1734099854.507:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.576553 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(18): [started] processing unit "oem-gce.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(1b): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(1b): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:24:14.576553 ignition[835]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:24:14.576553 ignition[835]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:24:14.576553 ignition[835]: INFO : files: files passed Dec 13 14:24:14.576553 ignition[835]: INFO : Ignition finished successfully Dec 13 14:24:14.993384 kernel: audit: type=1130 audit(1734099854.612:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.993454 kernel: audit: type=1130 audit(1734099854.666:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.993479 kernel: audit: type=1131 audit(1734099854.666:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.993503 kernel: audit: type=1130 audit(1734099854.805:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.993525 kernel: audit: type=1131 audit(1734099854.827:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.993545 kernel: audit: type=1130 audit(1734099854.964:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.508283 systemd[1]: Finished ignition-files.service. Dec 13 14:24:14.518317 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:24:15.018380 initrd-setup-root-after-ignition[858]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:24:14.564426 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:24:14.565612 systemd[1]: Starting ignition-quench.service... Dec 13 14:24:14.583840 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:24:15.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.613855 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:24:14.614019 systemd[1]: Finished ignition-quench.service. Dec 13 14:24:14.667777 systemd[1]: Reached target ignition-complete.target. Dec 13 14:24:14.729536 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:24:14.771349 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:24:14.771623 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:24:14.828435 systemd[1]: Reached target initrd-fs.target. Dec 13 14:24:14.878560 systemd[1]: Reached target initrd.target. Dec 13 14:24:14.912625 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:24:14.914289 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:24:14.950836 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:24:14.966901 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:24:15.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.011045 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:24:15.026745 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:24:15.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.048717 systemd[1]: Stopped target timers.target. Dec 13 14:24:15.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.072666 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:24:15.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.072887 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:24:15.360364 ignition[873]: INFO : Ignition 2.14.0 Dec 13 14:24:15.360364 ignition[873]: INFO : Stage: umount Dec 13 14:24:15.360364 ignition[873]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:15.360364 ignition[873]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:24:15.089016 systemd[1]: Stopped target initrd.target. Dec 13 14:24:15.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.430507 iscsid[699]: iscsid shutting down. Dec 13 14:24:15.445504 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:24:15.445504 ignition[873]: INFO : umount: umount passed Dec 13 14:24:15.445504 ignition[873]: INFO : Ignition finished successfully Dec 13 14:24:15.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.103683 systemd[1]: Stopped target basic.target. Dec 13 14:24:15.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.119684 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:24:15.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.134570 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:24:15.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.151572 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:24:15.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.167562 systemd[1]: Stopped target remote-fs.target. Dec 13 14:24:15.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.184593 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:24:15.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.200589 systemd[1]: Stopped target sysinit.target. Dec 13 14:24:15.215571 systemd[1]: Stopped target local-fs.target. Dec 13 14:24:15.230543 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:24:15.249605 systemd[1]: Stopped target swap.target. Dec 13 14:24:15.265531 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:24:15.265751 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:24:15.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.281710 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:24:15.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.296536 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:24:15.296755 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:24:15.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.311672 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:24:15.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.311860 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:24:15.329659 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:24:15.329847 systemd[1]: Stopped ignition-files.service. Dec 13 14:24:15.346005 systemd[1]: Stopping ignition-mount.service... Dec 13 14:24:15.367699 systemd[1]: Stopping iscsid.service... Dec 13 14:24:15.386368 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:24:15.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.386743 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:24:15.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.825000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:24:15.424137 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:24:15.437395 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:24:15.437724 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:24:15.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.454677 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:24:15.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.454855 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:24:15.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.477335 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:24:15.478484 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:24:15.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.478599 systemd[1]: Stopped iscsid.service. Dec 13 14:24:15.488107 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:24:15.488255 systemd[1]: Stopped ignition-mount.service. Dec 13 14:24:15.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.504109 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:24:15.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.504244 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:24:16.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.518232 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:24:15.518384 systemd[1]: Stopped ignition-disks.service. Dec 13 14:24:15.533485 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:24:16.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.533577 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:24:16.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.549465 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:24:16.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.549545 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:24:15.565477 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:24:15.565567 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:24:15.581494 systemd[1]: Stopped target paths.target. Dec 13 14:24:15.596358 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:24:15.598295 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:24:16.161356 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Dec 13 14:24:15.611391 systemd[1]: Stopped target slices.target. Dec 13 14:24:15.611528 systemd[1]: Stopped target sockets.target. Dec 13 14:24:15.633423 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:24:15.633498 systemd[1]: Closed iscsid.socket. Dec 13 14:24:15.647556 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:24:15.647649 systemd[1]: Stopped ignition-setup.service. Dec 13 14:24:15.669570 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:24:15.669650 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:24:15.684769 systemd[1]: Stopping iscsiuio.service... Dec 13 14:24:15.698814 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:24:15.698939 systemd[1]: Stopped iscsiuio.service. Dec 13 14:24:15.706896 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:24:15.707004 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:24:15.728601 systemd[1]: Stopped target network.target. Dec 13 14:24:15.746488 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:24:15.746552 systemd[1]: Closed iscsiuio.socket. Dec 13 14:24:15.768741 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:24:15.772270 systemd-networkd[690]: eth0: DHCPv6 lease lost Dec 13 14:24:16.160000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:24:15.782510 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:24:15.796839 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:24:15.796970 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:24:15.804221 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:24:15.804352 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:24:15.827148 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:24:15.827217 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:24:15.842430 systemd[1]: Stopping network-cleanup.service... Dec 13 14:24:15.849525 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:24:15.849621 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:24:15.864699 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:24:15.864773 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:24:15.886609 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:24:15.886676 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:24:15.904710 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:24:15.920114 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:24:15.920779 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:24:15.920930 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:24:15.928013 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:24:15.928113 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:24:15.948427 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:24:15.948494 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:24:15.963412 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:24:15.963513 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:24:15.979483 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:24:15.979556 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:24:15.994471 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:24:15.994545 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:24:16.011510 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:24:16.034440 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:24:16.034552 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:24:16.050213 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:24:16.050372 systemd[1]: Stopped network-cleanup.service. Dec 13 14:24:16.066870 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:24:16.066989 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:24:16.081743 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:24:16.098524 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:24:16.119398 systemd[1]: Switching root. Dec 13 14:24:16.163762 systemd-journald[189]: Journal stopped Dec 13 14:24:20.888152 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:24:20.889840 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:24:20.889872 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:24:20.889895 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:24:20.889917 kernel: SELinux: policy capability open_perms=1 Dec 13 14:24:20.889943 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:24:20.889966 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:24:20.889994 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:24:20.890017 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:24:20.890039 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:24:20.890060 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:24:20.890084 systemd[1]: Successfully loaded SELinux policy in 107.226ms. Dec 13 14:24:20.890130 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.706ms. Dec 13 14:24:20.890154 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:24:20.890177 systemd[1]: Detected virtualization kvm. Dec 13 14:24:20.890228 systemd[1]: Detected architecture x86-64. Dec 13 14:24:20.890257 systemd[1]: Detected first boot. Dec 13 14:24:20.890290 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:24:20.890315 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:24:20.890338 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:24:20.890363 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:24:20.890394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:24:20.890420 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:24:20.890454 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 14:24:20.890476 kernel: audit: type=1334 audit(1734099859.950:89): prog-id=12 op=LOAD Dec 13 14:24:20.890499 kernel: audit: type=1334 audit(1734099859.950:90): prog-id=3 op=UNLOAD Dec 13 14:24:20.890521 kernel: audit: type=1334 audit(1734099859.963:91): prog-id=13 op=LOAD Dec 13 14:24:20.890543 kernel: audit: type=1334 audit(1734099859.977:92): prog-id=14 op=LOAD Dec 13 14:24:20.890565 kernel: audit: type=1334 audit(1734099859.977:93): prog-id=4 op=UNLOAD Dec 13 14:24:20.890589 kernel: audit: type=1334 audit(1734099859.977:94): prog-id=5 op=UNLOAD Dec 13 14:24:20.890612 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:24:20.890640 kernel: audit: type=1131 audit(1734099859.979:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.890663 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:24:20.890685 kernel: audit: type=1334 audit(1734099860.034:96): prog-id=12 op=UNLOAD Dec 13 14:24:20.890708 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:24:20.890732 kernel: audit: type=1130 audit(1734099860.050:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.890755 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:24:20.890778 kernel: audit: type=1131 audit(1734099860.050:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.890801 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:24:20.890829 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:24:20.890853 systemd[1]: Created slice system-getty.slice. Dec 13 14:24:20.890876 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:24:20.890899 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:24:20.890929 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:24:20.890954 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:24:20.890977 systemd[1]: Created slice user.slice. Dec 13 14:24:20.891004 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:24:20.891026 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:24:20.891049 systemd[1]: Set up automount boot.automount. Dec 13 14:24:20.891073 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:24:20.891098 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:24:20.891121 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:24:20.891145 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:24:20.891168 systemd[1]: Reached target integritysetup.target. Dec 13 14:24:20.891204 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:24:20.891233 systemd[1]: Reached target remote-fs.target. Dec 13 14:24:20.891257 systemd[1]: Reached target slices.target. Dec 13 14:24:20.891287 systemd[1]: Reached target swap.target. Dec 13 14:24:20.891311 systemd[1]: Reached target torcx.target. Dec 13 14:24:20.891335 systemd[1]: Reached target veritysetup.target. Dec 13 14:24:20.891358 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:24:20.891381 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:24:20.891405 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:24:20.891427 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:24:20.891452 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:24:20.891479 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:24:20.891503 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:24:20.891527 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:24:20.891550 systemd[1]: Mounting media.mount... Dec 13 14:24:20.891573 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:20.891601 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:24:20.891633 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:24:20.891656 systemd[1]: Mounting tmp.mount... Dec 13 14:24:20.891680 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:24:20.891707 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:20.891730 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:24:20.891754 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:24:20.891776 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:20.891800 systemd[1]: Starting modprobe@drm.service... Dec 13 14:24:20.891823 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:20.891846 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:24:20.891868 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:20.891891 kernel: fuse: init (API version 7.34) Dec 13 14:24:20.891917 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:24:20.891941 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:24:20.891965 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:24:20.891988 kernel: loop: module loaded Dec 13 14:24:20.892010 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:24:20.892034 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:24:20.892057 systemd[1]: Stopped systemd-journald.service. Dec 13 14:24:20.892080 systemd[1]: Starting systemd-journald.service... Dec 13 14:24:20.892103 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:24:20.892133 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:24:20.892163 systemd-journald[998]: Journal started Dec 13 14:24:20.892281 systemd-journald[998]: Runtime Journal (/run/log/journal/0598279b92dc44dabe8acc384a45279a) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:24:16.469000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:24:16.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:24:16.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:24:16.617000 audit: BPF prog-id=10 op=LOAD Dec 13 14:24:16.617000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:24:16.618000 audit: BPF prog-id=11 op=LOAD Dec 13 14:24:16.618000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:24:16.771000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:24:16.771000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0000247f2 a1=c00002aac8 a2=c000028d00 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:16.771000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:24:16.781000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:24:16.781000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248c9 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:16.781000 audit: CWD cwd="/" Dec 13 14:24:16.781000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:16.781000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:16.781000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:24:19.950000 audit: BPF prog-id=12 op=LOAD Dec 13 14:24:19.950000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:24:19.963000 audit: BPF prog-id=13 op=LOAD Dec 13 14:24:19.977000 audit: BPF prog-id=14 op=LOAD Dec 13 14:24:19.977000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:24:19.977000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:24:19.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.034000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:24:20.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.851000 audit: BPF prog-id=15 op=LOAD Dec 13 14:24:20.851000 audit: BPF prog-id=16 op=LOAD Dec 13 14:24:20.851000 audit: BPF prog-id=17 op=LOAD Dec 13 14:24:20.851000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:24:20.851000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:24:20.884000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:24:20.884000 audit[998]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff0bb34540 a2=4000 a3=7fff0bb345dc items=0 ppid=1 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.884000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:24:16.767477 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:24:19.949425 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:24:16.768766 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:24:19.980414 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:24:16.768808 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:24:16.768863 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:24:16.768884 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:24:16.768945 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:24:16.768969 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:24:16.769320 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:24:16.769382 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:24:16.769407 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:24:16.770739 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:24:16.770809 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:24:16.770859 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:24:16.770889 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:24:16.770921 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:24:16.770949 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:24:19.322708 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:19.323006 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:19.323155 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:19.323443 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:19.323548 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:24:19.323633 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T14:24:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:24:20.919237 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:24:20.938612 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:24:20.961318 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:24:20.961662 systemd[1]: Stopped verity-setup.service. Dec 13 14:24:20.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.982220 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:20.992230 systemd[1]: Started systemd-journald.service. Dec 13 14:24:20.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.002079 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:24:21.009630 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:24:21.016613 systemd[1]: Mounted media.mount. Dec 13 14:24:21.024616 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:24:21.033598 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:24:21.042567 systemd[1]: Mounted tmp.mount. Dec 13 14:24:21.049735 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:24:21.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.058841 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:24:21.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.067838 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:24:21.068091 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:24:21.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.076851 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:21.077078 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:21.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.085859 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:24:21.086081 systemd[1]: Finished modprobe@drm.service. Dec 13 14:24:21.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.094846 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:21.095092 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:21.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.104871 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:24:21.105104 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:24:21.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.114827 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:21.115055 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:21.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.123950 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:24:21.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.132857 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:24:21.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.141881 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:24:21.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.150874 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:24:21.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.160300 systemd[1]: Reached target network-pre.target. Dec 13 14:24:21.171023 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:24:21.181043 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:24:21.188404 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:24:21.192964 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:24:21.202408 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:24:21.214750 systemd-journald[998]: Time spent on flushing to /var/log/journal/0598279b92dc44dabe8acc384a45279a is 86.418ms for 1130 entries. Dec 13 14:24:21.214750 systemd-journald[998]: System Journal (/var/log/journal/0598279b92dc44dabe8acc384a45279a) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:24:21.325379 systemd-journald[998]: Received client request to flush runtime journal. Dec 13 14:24:21.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.211620 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:21.213553 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:24:21.228434 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:24:21.230430 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:24:21.239243 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:24:21.327564 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:24:21.248106 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:24:21.258676 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:24:21.267593 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:24:21.276776 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:24:21.289176 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:24:21.299367 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:24:21.307810 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:24:21.326694 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:24:21.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.932294 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:24:21.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:21.940000 audit: BPF prog-id=18 op=LOAD Dec 13 14:24:21.940000 audit: BPF prog-id=19 op=LOAD Dec 13 14:24:21.940000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:24:21.940000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:24:21.942284 systemd[1]: Starting systemd-udevd.service... Dec 13 14:24:21.966280 systemd-udevd[1015]: Using default interface naming scheme 'v252'. Dec 13 14:24:22.019925 systemd[1]: Started systemd-udevd.service. Dec 13 14:24:22.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.030000 audit: BPF prog-id=20 op=LOAD Dec 13 14:24:22.032935 systemd[1]: Starting systemd-networkd.service... Dec 13 14:24:22.047000 audit: BPF prog-id=21 op=LOAD Dec 13 14:24:22.047000 audit: BPF prog-id=22 op=LOAD Dec 13 14:24:22.047000 audit: BPF prog-id=23 op=LOAD Dec 13 14:24:22.049766 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:24:22.092676 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:24:22.122700 systemd[1]: Started systemd-userdbd.service. Dec 13 14:24:22.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.200225 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:24:22.244223 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:24:22.275516 systemd-networkd[1029]: lo: Link UP Dec 13 14:24:22.275536 systemd-networkd[1029]: lo: Gained carrier Dec 13 14:24:22.277377 systemd-networkd[1029]: Enumeration completed Dec 13 14:24:22.277531 systemd[1]: Started systemd-networkd.service. Dec 13 14:24:22.277803 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:24:22.280622 systemd-networkd[1029]: eth0: Link UP Dec 13 14:24:22.280634 systemd-networkd[1029]: eth0: Gained carrier Dec 13 14:24:22.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.289390 systemd-networkd[1029]: eth0: DHCPv4 address 10.128.0.71/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:24:22.316258 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:24:22.278000 audit[1030]: AVC avc: denied { confidentiality } for pid=1030 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:24:22.278000 audit[1030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562f0dac74f0 a1=337fc a2=7f7c1b2dbbc5 a3=5 items=110 ppid=1015 pid=1030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.278000 audit: CWD cwd="/" Dec 13 14:24:22.278000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=1 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=2 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=3 name=(null) inode=13723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=4 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=5 name=(null) inode=13724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=6 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=7 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=8 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=9 name=(null) inode=13726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=10 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=11 name=(null) inode=13727 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=12 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=13 name=(null) inode=13728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=14 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=15 name=(null) inode=13729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=16 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=17 name=(null) inode=13730 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=18 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=19 name=(null) inode=13731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=20 name=(null) inode=13731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=21 name=(null) inode=13732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=22 name=(null) inode=13731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=23 name=(null) inode=13733 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=24 name=(null) inode=13731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=25 name=(null) inode=13734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=26 name=(null) inode=13731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=27 name=(null) inode=13735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=28 name=(null) inode=13731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=29 name=(null) inode=13736 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=30 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=31 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=32 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=33 name=(null) inode=13738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=34 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=35 name=(null) inode=13739 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=36 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=37 name=(null) inode=13740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=38 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=39 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=40 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=41 name=(null) inode=13742 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=42 name=(null) inode=13722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=43 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=44 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=45 name=(null) inode=13744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=46 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=47 name=(null) inode=13745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=48 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=49 name=(null) inode=13746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=50 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=51 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=52 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=53 name=(null) inode=13748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=55 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=56 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=57 name=(null) inode=13750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=58 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=59 name=(null) inode=13751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=60 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=61 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=62 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=63 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=64 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=65 name=(null) inode=13754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=66 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=67 name=(null) inode=13755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=68 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=69 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=70 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=71 name=(null) inode=13757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=72 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=73 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=74 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=75 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=76 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=77 name=(null) inode=13760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=78 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=79 name=(null) inode=13761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=80 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=81 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=82 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=83 name=(null) inode=13763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=84 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=85 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=86 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=87 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=88 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=89 name=(null) inode=13766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=90 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=91 name=(null) inode=13767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=92 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=93 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=94 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=95 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=96 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=97 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=98 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=99 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=100 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=101 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=102 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=103 name=(null) inode=13773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=104 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=105 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=106 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=107 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PATH item=109 name=(null) inode=14605 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:22.278000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:24:22.371394 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1037) Dec 13 14:24:22.371512 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:24:22.386213 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:24:22.400605 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:24:22.419296 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:24:22.434379 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:24:22.435814 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:24:22.450753 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:24:22.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.461018 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:24:22.490498 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:24:22.518615 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:24:22.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.527568 systemd[1]: Reached target cryptsetup.target. Dec 13 14:24:22.537889 systemd[1]: Starting lvm2-activation.service... Dec 13 14:24:22.544241 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:24:22.578653 systemd[1]: Finished lvm2-activation.service. Dec 13 14:24:22.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.587610 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:24:22.596413 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:24:22.596472 systemd[1]: Reached target local-fs.target. Dec 13 14:24:22.605443 systemd[1]: Reached target machines.target. Dec 13 14:24:22.615988 systemd[1]: Starting ldconfig.service... Dec 13 14:24:22.624426 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:22.624526 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:22.626358 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:24:22.635022 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:24:22.647119 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:24:22.649521 systemd[1]: Starting systemd-sysext.service... Dec 13 14:24:22.650369 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1055 (bootctl) Dec 13 14:24:22.653102 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:24:22.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.671553 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:24:22.680659 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:24:22.689048 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:24:22.689359 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:24:22.717161 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:24:22.808747 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) Dec 13 14:24:22.808747 systemd-fsck[1065]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:24:22.809703 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:24:22.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.821540 systemd[1]: Mounting boot.mount... Dec 13 14:24:22.849026 systemd[1]: Mounted boot.mount. Dec 13 14:24:22.857897 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:24:22.858854 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:24:22.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.876739 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:24:22.887270 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:24:22.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:22.917229 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:24:22.939085 (sd-sysext)[1070]: Using extensions 'kubernetes'. Dec 13 14:24:22.939771 (sd-sysext)[1070]: Merged extensions into '/usr'. Dec 13 14:24:22.966331 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:22.969586 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:24:22.975231 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:22.977769 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:22.987121 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:22.997502 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:23.004448 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.004739 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:23.004965 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.009974 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:24:23.017887 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:23.018109 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:23.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.027076 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:23.027636 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:23.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.038098 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:23.038340 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:23.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.048203 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:23.048408 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.050126 systemd[1]: Finished systemd-sysext.service. Dec 13 14:24:23.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.060555 systemd[1]: Starting ensure-sysext.service... Dec 13 14:24:23.070125 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:24:23.083389 systemd[1]: Reloading. Dec 13 14:24:23.118523 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:24:23.133088 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:24:23.150543 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:24:23.225577 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2024-12-13T14:24:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:24:23.226126 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2024-12-13T14:24:23Z" level=info msg="torcx already run" Dec 13 14:24:23.325771 ldconfig[1054]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:24:23.398993 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:24:23.399328 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:24:23.441595 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:24:23.523000 audit: BPF prog-id=24 op=LOAD Dec 13 14:24:23.523000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:24:23.523000 audit: BPF prog-id=25 op=LOAD Dec 13 14:24:23.523000 audit: BPF prog-id=26 op=LOAD Dec 13 14:24:23.524000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:24:23.524000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:24:23.524000 audit: BPF prog-id=27 op=LOAD Dec 13 14:24:23.524000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:24:23.527000 audit: BPF prog-id=28 op=LOAD Dec 13 14:24:23.527000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:24:23.527000 audit: BPF prog-id=29 op=LOAD Dec 13 14:24:23.527000 audit: BPF prog-id=30 op=LOAD Dec 13 14:24:23.527000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:24:23.527000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:24:23.528000 audit: BPF prog-id=31 op=LOAD Dec 13 14:24:23.528000 audit: BPF prog-id=32 op=LOAD Dec 13 14:24:23.529000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:24:23.529000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:24:23.535148 systemd[1]: Finished ldconfig.service. Dec 13 14:24:23.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.544141 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:24:23.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.559727 systemd[1]: Starting audit-rules.service... Dec 13 14:24:23.568469 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:24:23.579578 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:24:23.587992 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:24:23.596000 audit: BPF prog-id=33 op=LOAD Dec 13 14:24:23.599771 systemd[1]: Starting systemd-resolved.service... Dec 13 14:24:23.607000 audit: BPF prog-id=34 op=LOAD Dec 13 14:24:23.610646 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:24:23.620682 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:24:23.630801 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:24:23.630000 audit[1167]: SYSTEM_BOOT pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.641240 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:24:23.641506 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:24:23.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:23.645000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:24:23.645000 audit[1171]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff3819250 a2=420 a3=0 items=0 ppid=1141 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.645000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:24:23.647750 augenrules[1171]: No rules Dec 13 14:24:23.651128 systemd[1]: Finished audit-rules.service. Dec 13 14:24:23.659018 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:24:23.675179 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.677711 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:23.686673 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:23.696640 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:23.702355 systemd-networkd[1029]: eth0: Gained IPv6LL Dec 13 14:24:23.706574 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:24:23.714478 enable-oslogin[1179]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:24:23.715428 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.715796 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:23.718454 systemd[1]: Starting systemd-update-done.service... Dec 13 14:24:23.725323 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:24:23.733475 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:23.733721 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:23.743328 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:23.743543 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:23.753283 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:23.753501 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:23.763267 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:24:23.763507 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:24:23.773472 systemd[1]: Finished systemd-update-done.service. Dec 13 14:24:23.786266 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.786679 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.789312 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:23.798511 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:23.807452 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:23.809842 systemd-resolved[1156]: Positive Trust Anchors: Dec 13 14:24:23.810255 systemd-resolved[1156]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:24:23.810312 systemd-resolved[1156]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:24:23.811244 systemd-timesyncd[1161]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:24:23.811711 systemd-timesyncd[1161]: Initial clock synchronization to Fri 2024-12-13 14:24:23.873165 UTC. Dec 13 14:24:23.816271 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:24:23.822453 enable-oslogin[1185]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:24:23.824392 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.824627 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:23.824842 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:24:23.824993 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.826776 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:24:23.836706 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:24:23.846161 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:23.846517 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:23.849678 systemd-resolved[1156]: Defaulting to hostname 'linux'. Dec 13 14:24:23.855776 systemd[1]: Started systemd-resolved.service. Dec 13 14:24:23.864933 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:23.865103 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:23.874178 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:23.874436 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:23.884051 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:24:23.884344 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:24:23.898499 systemd[1]: Reached target network.target. Dec 13 14:24:23.908528 systemd[1]: Reached target nss-lookup.target. Dec 13 14:24:23.917557 systemd[1]: Reached target time-set.target. Dec 13 14:24:23.926530 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.927009 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.929094 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:23.938592 systemd[1]: Starting modprobe@drm.service... Dec 13 14:24:23.948403 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:23.957539 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:23.967709 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:24:23.971846 enable-oslogin[1190]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:24:23.977509 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:23.977878 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:23.980088 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:24:23.988415 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:24:23.988703 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.991662 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:23.991889 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:24.001013 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:24:24.001258 systemd[1]: Finished modprobe@drm.service. Dec 13 14:24:24.010035 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:24.010317 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:24.018980 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:24.019234 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:24.027994 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:24:24.028292 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:24:24.038026 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:24:24.049510 systemd[1]: Reached target network-online.target. Dec 13 14:24:24.058567 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:24.058624 systemd[1]: Reached target sysinit.target. Dec 13 14:24:24.067540 systemd[1]: Started motdgen.path. Dec 13 14:24:24.074504 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:24:24.084654 systemd[1]: Started logrotate.timer. Dec 13 14:24:24.091550 systemd[1]: Started mdadm.timer. Dec 13 14:24:24.098429 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:24:24.107437 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:24:24.107499 systemd[1]: Reached target paths.target. Dec 13 14:24:24.114375 systemd[1]: Reached target timers.target. Dec 13 14:24:24.122133 systemd[1]: Listening on dbus.socket. Dec 13 14:24:24.130977 systemd[1]: Starting docker.socket... Dec 13 14:24:24.142880 systemd[1]: Listening on sshd.socket. Dec 13 14:24:24.150560 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:24.150791 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:24:24.151865 systemd[1]: Finished ensure-sysext.service. Dec 13 14:24:24.160701 systemd[1]: Listening on docker.socket. Dec 13 14:24:24.169565 systemd[1]: Reached target sockets.target. Dec 13 14:24:24.178422 systemd[1]: Reached target basic.target. Dec 13 14:24:24.185465 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:24:24.185510 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:24:24.187218 systemd[1]: Starting containerd.service... Dec 13 14:24:24.195877 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:24:24.208285 systemd[1]: Starting dbus.service... Dec 13 14:24:24.216044 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:24:24.226021 systemd[1]: Starting extend-filesystems.service... Dec 13 14:24:24.232763 jq[1197]: false Dec 13 14:24:24.234394 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:24:24.237106 systemd[1]: Starting kubelet.service... Dec 13 14:24:24.246450 systemd[1]: Starting motdgen.service... Dec 13 14:24:24.255679 systemd[1]: Starting oem-gce.service... Dec 13 14:24:24.264360 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:24:24.273434 systemd[1]: Starting sshd-keygen.service... Dec 13 14:24:24.285179 extend-filesystems[1198]: Found loop1 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda1 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda2 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda3 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found usr Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda4 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda6 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda7 Dec 13 14:24:24.292074 extend-filesystems[1198]: Found sda9 Dec 13 14:24:24.292074 extend-filesystems[1198]: Checking size of /dev/sda9 Dec 13 14:24:24.426670 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:24:24.285985 systemd[1]: Starting systemd-logind.service... Dec 13 14:24:24.430524 extend-filesystems[1198]: Resized partition /dev/sda9 Dec 13 14:24:24.292366 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:24.438805 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:24:24.292482 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:24:24.293362 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:24:24.447817 jq[1221]: true Dec 13 14:24:24.296675 systemd[1]: Starting update-engine.service... Dec 13 14:24:24.313620 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:24:24.342651 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:24:24.342957 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:24:24.448825 jq[1230]: true Dec 13 14:24:24.347836 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:24:24.460361 mkfs.ext4[1232]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:24:24.460361 mkfs.ext4[1232]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:24:24.460361 mkfs.ext4[1232]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:24:24.460361 mkfs.ext4[1232]: Filesystem UUID: 7a01e21d-267e-46b7-88b9-407592d06b66 Dec 13 14:24:24.460361 mkfs.ext4[1232]: Superblock backups stored on blocks: Dec 13 14:24:24.460361 mkfs.ext4[1232]: 32768, 98304, 163840, 229376 Dec 13 14:24:24.460361 mkfs.ext4[1232]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:24:24.460361 mkfs.ext4[1232]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:24:24.460361 mkfs.ext4[1232]: Creating journal (8192 blocks): done Dec 13 14:24:24.460361 mkfs.ext4[1232]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:24:24.349353 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:24:24.374614 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:24:24.466541 dbus-daemon[1196]: [system] SELinux support is enabled Dec 13 14:24:24.374845 systemd[1]: Finished motdgen.service. Dec 13 14:24:24.466799 systemd[1]: Started dbus.service. Dec 13 14:24:24.478592 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:24:24.481129 dbus-daemon[1196]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:24:24.478656 systemd[1]: Reached target system-config.target. Dec 13 14:24:24.487921 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:24:24.487967 systemd[1]: Reached target user-config.target. Dec 13 14:24:24.489517 umount[1240]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:24:24.496695 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:24:24.512655 dbus-daemon[1196]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:24:24.525497 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:24:24.525677 extend-filesystems[1229]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:24:24.525677 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:24:24.525677 extend-filesystems[1229]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:24:24.519624 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:24:24.573680 update_engine[1219]: I1213 14:24:24.547014 1219 main.cc:92] Flatcar Update Engine starting Dec 13 14:24:24.573680 update_engine[1219]: I1213 14:24:24.556263 1219 update_check_scheduler.cc:74] Next update check in 11m14s Dec 13 14:24:24.574068 extend-filesystems[1198]: Resized filesystem in /dev/sda9 Dec 13 14:24:24.602435 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:24:24.533138 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:24:24.533412 systemd[1]: Finished extend-filesystems.service. Dec 13 14:24:24.556025 systemd[1]: Started update-engine.service. Dec 13 14:24:24.600918 systemd[1]: Started locksmithd.service. Dec 13 14:24:24.625648 bash[1261]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:24:24.627315 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:24:24.717414 env[1231]: time="2024-12-13T14:24:24.717339926Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:24:24.800981 systemd-logind[1216]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:24:24.809337 systemd-logind[1216]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:24:24.809580 systemd-logind[1216]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:24:24.809940 systemd-logind[1216]: New seat seat0. Dec 13 14:24:24.820086 systemd[1]: Started systemd-logind.service. Dec 13 14:24:24.939598 env[1231]: time="2024-12-13T14:24:24.939528730Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:24:24.939794 env[1231]: time="2024-12-13T14:24:24.939749632Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:24.949023 coreos-metadata[1195]: Dec 13 14:24:24.948 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:24:24.954642 env[1231]: time="2024-12-13T14:24:24.954578671Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:24.954642 env[1231]: time="2024-12-13T14:24:24.954637788Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:24.955055 env[1231]: time="2024-12-13T14:24:24.955010452Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:24.955149 env[1231]: time="2024-12-13T14:24:24.955056561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:24.955149 env[1231]: time="2024-12-13T14:24:24.955081186Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:24:24.955149 env[1231]: time="2024-12-13T14:24:24.955097010Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:24.955382 env[1231]: time="2024-12-13T14:24:24.955299447Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:24.955696 env[1231]: time="2024-12-13T14:24:24.955658066Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:24.955956 env[1231]: time="2024-12-13T14:24:24.955919712Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:24.956039 env[1231]: time="2024-12-13T14:24:24.955956474Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:24:24.956091 env[1231]: time="2024-12-13T14:24:24.956038669Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:24:24.956091 env[1231]: time="2024-12-13T14:24:24.956062401Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:24:24.956928 coreos-metadata[1195]: Dec 13 14:24:24.956 INFO Fetch failed with 404: resource not found Dec 13 14:24:24.956928 coreos-metadata[1195]: Dec 13 14:24:24.956 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:24:24.958276 coreos-metadata[1195]: Dec 13 14:24:24.958 INFO Fetch successful Dec 13 14:24:24.958552 coreos-metadata[1195]: Dec 13 14:24:24.958 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:24:24.959974 coreos-metadata[1195]: Dec 13 14:24:24.959 INFO Fetch failed with 404: resource not found Dec 13 14:24:24.959974 coreos-metadata[1195]: Dec 13 14:24:24.959 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:24:24.961423 coreos-metadata[1195]: Dec 13 14:24:24.961 INFO Fetch failed with 404: resource not found Dec 13 14:24:24.961423 coreos-metadata[1195]: Dec 13 14:24:24.961 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:24:24.963401 coreos-metadata[1195]: Dec 13 14:24:24.963 INFO Fetch successful Dec 13 14:24:24.968831 unknown[1195]: wrote ssh authorized keys file for user: core Dec 13 14:24:24.979783 env[1231]: time="2024-12-13T14:24:24.979723293Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:24:24.979934 env[1231]: time="2024-12-13T14:24:24.979791492Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:24:24.979934 env[1231]: time="2024-12-13T14:24:24.979813372Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:24:24.979934 env[1231]: time="2024-12-13T14:24:24.979880139Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.979934 env[1231]: time="2024-12-13T14:24:24.979903758Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.979975745Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.980000556Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.980028851Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.980072759Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.980096578Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.980117177Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.980150 env[1231]: time="2024-12-13T14:24:24.980140417Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:24:24.980521 env[1231]: time="2024-12-13T14:24:24.980358198Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:24:24.980521 env[1231]: time="2024-12-13T14:24:24.980489470Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:24:24.981086 env[1231]: time="2024-12-13T14:24:24.981041900Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:24:24.981175 env[1231]: time="2024-12-13T14:24:24.981102549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981175 env[1231]: time="2024-12-13T14:24:24.981129385Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:24:24.981315 env[1231]: time="2024-12-13T14:24:24.981268902Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981315 env[1231]: time="2024-12-13T14:24:24.981295885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981429 env[1231]: time="2024-12-13T14:24:24.981405799Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981488 env[1231]: time="2024-12-13T14:24:24.981436198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981488 env[1231]: time="2024-12-13T14:24:24.981457216Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981488 env[1231]: time="2024-12-13T14:24:24.981480380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981624 env[1231]: time="2024-12-13T14:24:24.981502579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981624 env[1231]: time="2024-12-13T14:24:24.981525977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981624 env[1231]: time="2024-12-13T14:24:24.981551489Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:24:24.981781 env[1231]: time="2024-12-13T14:24:24.981734089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981781 env[1231]: time="2024-12-13T14:24:24.981760183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981878 env[1231]: time="2024-12-13T14:24:24.981781959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.981878 env[1231]: time="2024-12-13T14:24:24.981802943Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:24:24.981878 env[1231]: time="2024-12-13T14:24:24.981831901Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:24:24.981878 env[1231]: time="2024-12-13T14:24:24.981852677Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:24:24.982048 env[1231]: time="2024-12-13T14:24:24.981882458Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:24:24.982048 env[1231]: time="2024-12-13T14:24:24.981933592Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:24:24.982398 env[1231]: time="2024-12-13T14:24:24.982295755Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:24:24.986187 env[1231]: time="2024-12-13T14:24:24.982412440Z" level=info msg="Connect containerd service" Dec 13 14:24:24.986187 env[1231]: time="2024-12-13T14:24:24.982470255Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:24:24.986520 env[1231]: time="2024-12-13T14:24:24.986478108Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986718097Z" level=info msg="Start subscribing containerd event" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986802385Z" level=info msg="Start recovering state" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986874181Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986892866Z" level=info msg="Start event monitor" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986918037Z" level=info msg="Start snapshots syncer" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986935986Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986951567Z" level=info msg="Start streaming server" Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.986942679Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:24:24.988231 env[1231]: time="2024-12-13T14:24:24.987152000Z" level=info msg="containerd successfully booted in 0.287105s" Dec 13 14:24:24.987335 systemd[1]: Started containerd.service. Dec 13 14:24:25.006675 dbus-daemon[1196]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:24:25.006943 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:24:25.008354 dbus-daemon[1196]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1251 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:24:25.020841 systemd[1]: Starting polkit.service... Dec 13 14:24:25.023226 update-ssh-keys[1270]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:24:25.029190 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:24:25.098834 polkitd[1271]: Started polkitd version 121 Dec 13 14:24:25.123757 polkitd[1271]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:24:25.124043 polkitd[1271]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:24:25.130516 polkitd[1271]: Finished loading, compiling and executing 2 rules Dec 13 14:24:25.131352 dbus-daemon[1196]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:24:25.131575 systemd[1]: Started polkit.service. Dec 13 14:24:25.132477 polkitd[1271]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:24:25.157119 systemd-hostnamed[1251]: Hostname set to (transient) Dec 13 14:24:25.160465 systemd-resolved[1156]: System hostname changed to 'ci-3510-3-6-509857d8aa79bbfa28d6.c.flatcar-212911.internal'. Dec 13 14:24:26.392873 sshd_keygen[1222]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:24:26.413793 systemd[1]: Started kubelet.service. Dec 13 14:24:26.491483 systemd[1]: Finished sshd-keygen.service. Dec 13 14:24:26.501122 systemd[1]: Starting issuegen.service... Dec 13 14:24:26.514679 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:24:26.514961 systemd[1]: Finished issuegen.service. Dec 13 14:24:26.527337 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:24:26.542125 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:24:26.552759 systemd[1]: Started getty@tty1.service. Dec 13 14:24:26.563689 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:24:26.572781 systemd[1]: Reached target getty.target. Dec 13 14:24:26.586514 locksmithd[1262]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:24:27.429574 kubelet[1288]: E1213 14:24:27.429499 1288 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:27.432677 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:27.432913 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:27.433344 systemd[1]: kubelet.service: Consumed 1.345s CPU time. Dec 13 14:24:29.823787 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:24:32.067240 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:24:32.088965 systemd-nspawn[1304]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:24:32.088965 systemd-nspawn[1304]: Press ^] three times within 1s to kill container. Dec 13 14:24:32.102241 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:24:32.188116 systemd[1]: Started oem-gce.service. Dec 13 14:24:32.188586 systemd[1]: Reached target multi-user.target. Dec 13 14:24:32.191166 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:24:32.202912 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:24:32.203178 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:24:32.203470 systemd[1]: Startup finished in 1.064s (kernel) + 7.524s (initrd) + 15.857s (userspace) = 24.446s. Dec 13 14:24:32.239108 systemd-nspawn[1304]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:24:32.239350 systemd-nspawn[1304]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:24:32.239350 systemd-nspawn[1304]: + /usr/bin/google_instance_setup Dec 13 14:24:32.935657 instance-setup[1310]: INFO Running google_set_multiqueue. Dec 13 14:24:32.951492 instance-setup[1310]: INFO Set channels for eth0 to 2. Dec 13 14:24:32.954926 instance-setup[1310]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:24:32.956552 instance-setup[1310]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:24:32.957001 instance-setup[1310]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:24:32.958353 instance-setup[1310]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:24:32.958803 instance-setup[1310]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:24:32.960323 instance-setup[1310]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:24:32.960667 instance-setup[1310]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:24:32.962082 instance-setup[1310]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:24:32.973874 instance-setup[1310]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:24:32.974059 instance-setup[1310]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:24:33.018180 systemd-nspawn[1304]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:24:33.358139 startup-script[1341]: INFO Starting startup scripts. Dec 13 14:24:33.372036 startup-script[1341]: INFO No startup scripts found in metadata. Dec 13 14:24:33.372232 startup-script[1341]: INFO Finished running startup scripts. Dec 13 14:24:33.409721 systemd-nspawn[1304]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:24:33.409721 systemd-nspawn[1304]: + daemon_pids=() Dec 13 14:24:33.410306 systemd-nspawn[1304]: + for d in accounts clock_skew network Dec 13 14:24:33.410668 systemd-nspawn[1304]: + daemon_pids+=($!) Dec 13 14:24:33.410829 systemd-nspawn[1304]: + /usr/bin/google_accounts_daemon Dec 13 14:24:33.410829 systemd-nspawn[1304]: + for d in accounts clock_skew network Dec 13 14:24:33.411332 systemd-nspawn[1304]: + daemon_pids+=($!) Dec 13 14:24:33.411489 systemd-nspawn[1304]: + /usr/bin/google_clock_skew_daemon Dec 13 14:24:33.411489 systemd-nspawn[1304]: + for d in accounts clock_skew network Dec 13 14:24:33.411942 systemd-nspawn[1304]: + daemon_pids+=($!) Dec 13 14:24:33.412232 systemd-nspawn[1304]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:24:33.412419 systemd-nspawn[1304]: + /usr/bin/systemd-notify --ready Dec 13 14:24:33.413415 systemd-nspawn[1304]: + /usr/bin/google_network_daemon Dec 13 14:24:33.473780 systemd-nspawn[1304]: + wait -n 36 37 38 Dec 13 14:24:33.532403 systemd[1]: Created slice system-sshd.slice. Dec 13 14:24:33.537850 systemd[1]: Started sshd@0-10.128.0.71:22-139.178.68.195:39088.service. Dec 13 14:24:33.876013 sshd[1349]: Accepted publickey for core from 139.178.68.195 port 39088 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:33.879467 sshd[1349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:33.900257 systemd[1]: Created slice user-500.slice. Dec 13 14:24:33.902365 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:24:33.908870 systemd-logind[1216]: New session 1 of user core. Dec 13 14:24:33.924830 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:24:33.929874 systemd[1]: Starting user@500.service... Dec 13 14:24:33.950889 (systemd)[1352]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:34.181326 systemd[1352]: Queued start job for default target default.target. Dec 13 14:24:34.182175 systemd[1352]: Reached target paths.target. Dec 13 14:24:34.182231 systemd[1352]: Reached target sockets.target. Dec 13 14:24:34.182254 systemd[1352]: Reached target timers.target. Dec 13 14:24:34.182286 systemd[1352]: Reached target basic.target. Dec 13 14:24:34.182366 systemd[1352]: Reached target default.target. Dec 13 14:24:34.182420 systemd[1352]: Startup finished in 213ms. Dec 13 14:24:34.182464 systemd[1]: Started user@500.service. Dec 13 14:24:34.184254 systemd[1]: Started session-1.scope. Dec 13 14:24:34.294768 google-clock-skew[1345]: INFO Starting Google Clock Skew daemon. Dec 13 14:24:34.311003 google-clock-skew[1345]: INFO Clock drift token has changed: 0. Dec 13 14:24:34.318024 systemd-nspawn[1304]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:24:34.318462 groupadd[1365]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:24:34.319346 systemd-nspawn[1304]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:24:34.320445 google-clock-skew[1345]: WARNING Failed to sync system time with hardware clock. Dec 13 14:24:34.324040 groupadd[1365]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:24:34.340362 groupadd[1365]: new group: name=google-sudoers, GID=1000 Dec 13 14:24:34.362422 google-networking[1346]: INFO Starting Google Networking daemon. Dec 13 14:24:34.370285 google-accounts[1344]: INFO Starting Google Accounts daemon. Dec 13 14:24:34.418550 systemd[1]: Started sshd@1-10.128.0.71:22-139.178.68.195:39104.service. Dec 13 14:24:34.455717 google-accounts[1344]: WARNING OS Login not installed. Dec 13 14:24:34.456951 google-accounts[1344]: INFO Creating a new user account for 0. Dec 13 14:24:34.463428 systemd-nspawn[1304]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:24:34.464667 google-accounts[1344]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:24:34.730713 sshd[1376]: Accepted publickey for core from 139.178.68.195 port 39104 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:34.732872 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:34.739290 systemd-logind[1216]: New session 2 of user core. Dec 13 14:24:34.740608 systemd[1]: Started session-2.scope. Dec 13 14:24:34.949914 sshd[1376]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:34.955671 systemd[1]: sshd@1-10.128.0.71:22-139.178.68.195:39104.service: Deactivated successfully. Dec 13 14:24:34.956802 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:24:34.957649 systemd-logind[1216]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:24:34.958914 systemd-logind[1216]: Removed session 2. Dec 13 14:24:34.995820 systemd[1]: Started sshd@2-10.128.0.71:22-139.178.68.195:39110.service. Dec 13 14:24:35.289153 sshd[1385]: Accepted publickey for core from 139.178.68.195 port 39110 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:35.291031 sshd[1385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:35.297643 systemd[1]: Started session-3.scope. Dec 13 14:24:35.298265 systemd-logind[1216]: New session 3 of user core. Dec 13 14:24:35.498595 sshd[1385]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:35.502944 systemd[1]: sshd@2-10.128.0.71:22-139.178.68.195:39110.service: Deactivated successfully. Dec 13 14:24:35.504052 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:24:35.504996 systemd-logind[1216]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:24:35.506338 systemd-logind[1216]: Removed session 3. Dec 13 14:24:35.543808 systemd[1]: Started sshd@3-10.128.0.71:22-139.178.68.195:39126.service. Dec 13 14:24:35.834182 sshd[1391]: Accepted publickey for core from 139.178.68.195 port 39126 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:35.836027 sshd[1391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:35.842267 systemd-logind[1216]: New session 4 of user core. Dec 13 14:24:35.843240 systemd[1]: Started session-4.scope. Dec 13 14:24:36.048527 sshd[1391]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:36.052704 systemd[1]: sshd@3-10.128.0.71:22-139.178.68.195:39126.service: Deactivated successfully. Dec 13 14:24:36.053791 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:24:36.054669 systemd-logind[1216]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:24:36.055866 systemd-logind[1216]: Removed session 4. Dec 13 14:24:36.094181 systemd[1]: Started sshd@4-10.128.0.71:22-139.178.68.195:48234.service. Dec 13 14:24:36.385643 sshd[1397]: Accepted publickey for core from 139.178.68.195 port 48234 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:36.387430 sshd[1397]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:36.394359 systemd[1]: Started session-5.scope. Dec 13 14:24:36.394987 systemd-logind[1216]: New session 5 of user core. Dec 13 14:24:36.583250 sudo[1400]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:24:36.583708 sudo[1400]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:36.594486 dbus-daemon[1196]: \xd0\xcd\xc4\xc5\u000fV: received setenforce notice (enforcing=-631033680) Dec 13 14:24:36.596781 sudo[1400]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:36.640898 sshd[1397]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:36.646338 systemd[1]: sshd@4-10.128.0.71:22-139.178.68.195:48234.service: Deactivated successfully. Dec 13 14:24:36.647529 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:24:36.648416 systemd-logind[1216]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:24:36.649787 systemd-logind[1216]: Removed session 5. Dec 13 14:24:36.687398 systemd[1]: Started sshd@5-10.128.0.71:22-139.178.68.195:48244.service. Dec 13 14:24:36.981048 sshd[1404]: Accepted publickey for core from 139.178.68.195 port 48244 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:36.982630 sshd[1404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:36.988707 systemd-logind[1216]: New session 6 of user core. Dec 13 14:24:36.989485 systemd[1]: Started session-6.scope. Dec 13 14:24:37.158714 sudo[1408]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:24:37.159129 sudo[1408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:37.163453 sudo[1408]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:37.176291 sudo[1407]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:24:37.176711 sudo[1407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:37.189891 systemd[1]: Stopping audit-rules.service... Dec 13 14:24:37.192000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:24:37.193494 auditctl[1411]: No rules Dec 13 14:24:37.213605 kernel: kauditd_printk_skb: 203 callbacks suppressed Dec 13 14:24:37.213773 kernel: audit: type=1305 audit(1734099877.192:185): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:24:37.213813 kernel: audit: type=1300 audit(1734099877.192:185): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0a961050 a2=420 a3=0 items=0 ppid=1 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:37.192000 audit[1411]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0a961050 a2=420 a3=0 items=0 ppid=1 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:37.198689 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:24:37.198960 systemd[1]: Stopped audit-rules.service. Dec 13 14:24:37.222113 systemd[1]: Starting audit-rules.service... Dec 13 14:24:37.254233 kernel: audit: type=1327 audit(1734099877.192:185): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:24:37.192000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:24:37.255538 kernel: audit: type=1131 audit(1734099877.198:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.276542 augenrules[1428]: No rules Dec 13 14:24:37.277633 systemd[1]: Finished audit-rules.service. Dec 13 14:24:37.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.279306 sudo[1407]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:37.278000 audit[1407]: USER_END pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.301227 kernel: audit: type=1130 audit(1734099877.276:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.301288 kernel: audit: type=1106 audit(1734099877.278:188): pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.278000 audit[1407]: CRED_DISP pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.326102 sshd[1404]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:37.331514 systemd[1]: sshd@5-10.128.0.71:22-139.178.68.195:48244.service: Deactivated successfully. Dec 13 14:24:37.332703 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:24:37.334551 systemd-logind[1216]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:24:37.336442 systemd-logind[1216]: Removed session 6. Dec 13 14:24:37.348904 kernel: audit: type=1104 audit(1734099877.278:189): pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.349048 kernel: audit: type=1106 audit(1734099877.324:190): pid=1404 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.324000 audit[1404]: USER_END pid=1404 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.324000 audit[1404]: CRED_DISP pid=1404 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.390432 systemd[1]: Started sshd@6-10.128.0.71:22-139.178.68.195:48258.service. Dec 13 14:24:37.406386 kernel: audit: type=1104 audit(1734099877.324:191): pid=1404 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.406546 kernel: audit: type=1131 audit(1734099877.329:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.71:22-139.178.68.195:48244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.71:22-139.178.68.195:48244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.71:22-139.178.68.195:48258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.633383 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:24:37.633851 systemd[1]: Stopped kubelet.service. Dec 13 14:24:37.633931 systemd[1]: kubelet.service: Consumed 1.345s CPU time. Dec 13 14:24:37.636167 systemd[1]: Starting kubelet.service... Dec 13 14:24:37.696000 audit[1434]: USER_ACCT pid=1434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.698093 sshd[1434]: Accepted publickey for core from 139.178.68.195 port 48258 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:37.698000 audit[1434]: CRED_ACQ pid=1434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.698000 audit[1434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe020920d0 a2=3 a3=0 items=0 ppid=1 pid=1434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:37.698000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:37.700411 sshd[1434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:37.707329 systemd[1]: Started session-7.scope. Dec 13 14:24:37.708120 systemd-logind[1216]: New session 7 of user core. Dec 13 14:24:37.715000 audit[1434]: USER_START pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.717000 audit[1438]: CRED_ACQ pid=1438 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:37.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.870649 systemd[1]: Started kubelet.service. Dec 13 14:24:37.884000 audit[1440]: USER_ACCT pid=1440 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.886728 sudo[1440]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:24:37.887000 audit[1440]: CRED_REFR pid=1440 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.888003 sudo[1440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:37.890000 audit[1440]: USER_START pid=1440 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:37.912735 systemd[1]: Starting coreos-metadata.service... Dec 13 14:24:37.971834 kubelet[1442]: E1213 14:24:37.971775 1442 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:37.976838 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:37.977064 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:37.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:24:37.989414 coreos-metadata[1450]: Dec 13 14:24:37.989 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Dec 13 14:24:37.991029 coreos-metadata[1450]: Dec 13 14:24:37.990 INFO Fetch successful Dec 13 14:24:37.991177 coreos-metadata[1450]: Dec 13 14:24:37.991 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Dec 13 14:24:37.992410 coreos-metadata[1450]: Dec 13 14:24:37.992 INFO Fetch successful Dec 13 14:24:37.992542 coreos-metadata[1450]: Dec 13 14:24:37.992 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Dec 13 14:24:37.993645 coreos-metadata[1450]: Dec 13 14:24:37.993 INFO Fetch successful Dec 13 14:24:37.993745 coreos-metadata[1450]: Dec 13 14:24:37.993 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Dec 13 14:24:37.994734 coreos-metadata[1450]: Dec 13 14:24:37.994 INFO Fetch successful Dec 13 14:24:38.005617 systemd[1]: Finished coreos-metadata.service. Dec 13 14:24:38.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:38.920735 systemd[1]: Stopped kubelet.service. Dec 13 14:24:38.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:38.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:38.924906 systemd[1]: Starting kubelet.service... Dec 13 14:24:38.980389 systemd[1]: Reloading. Dec 13 14:24:39.144016 /usr/lib/systemd/system-generators/torcx-generator[1501]: time="2024-12-13T14:24:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:24:39.146296 /usr/lib/systemd/system-generators/torcx-generator[1501]: time="2024-12-13T14:24:39Z" level=info msg="torcx already run" Dec 13 14:24:39.246338 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:24:39.246365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:24:39.271154 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.364000 audit: BPF prog-id=43 op=LOAD Dec 13 14:24:39.364000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit: BPF prog-id=44 op=LOAD Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.365000 audit: BPF prog-id=45 op=LOAD Dec 13 14:24:39.365000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:24:39.365000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit: BPF prog-id=46 op=LOAD Dec 13 14:24:39.367000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit: BPF prog-id=47 op=LOAD Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.367000 audit: BPF prog-id=48 op=LOAD Dec 13 14:24:39.367000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:24:39.367000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.368000 audit: BPF prog-id=49 op=LOAD Dec 13 14:24:39.368000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit: BPF prog-id=50 op=LOAD Dec 13 14:24:39.372000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit: BPF prog-id=51 op=LOAD Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.372000 audit: BPF prog-id=52 op=LOAD Dec 13 14:24:39.372000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:24:39.372000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.375000 audit: BPF prog-id=53 op=LOAD Dec 13 14:24:39.375000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit: BPF prog-id=54 op=LOAD Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.376000 audit: BPF prog-id=55 op=LOAD Dec 13 14:24:39.376000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:24:39.376000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.377000 audit: BPF prog-id=56 op=LOAD Dec 13 14:24:39.377000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit: BPF prog-id=57 op=LOAD Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.380000 audit: BPF prog-id=58 op=LOAD Dec 13 14:24:39.380000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:24:39.380000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.381000 audit: BPF prog-id=59 op=LOAD Dec 13 14:24:39.381000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:39.403000 audit: BPF prog-id=60 op=LOAD Dec 13 14:24:39.403000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:24:39.428508 systemd[1]: Started kubelet.service. Dec 13 14:24:39.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.437037 systemd[1]: Stopping kubelet.service... Dec 13 14:24:39.437739 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:24:39.438024 systemd[1]: Stopped kubelet.service. Dec 13 14:24:39.440867 systemd[1]: Starting kubelet.service... Dec 13 14:24:39.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.629610 systemd[1]: Started kubelet.service. Dec 13 14:24:39.695206 kubelet[1556]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:24:39.695206 kubelet[1556]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:24:39.695206 kubelet[1556]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:24:39.696034 kubelet[1556]: I1213 14:24:39.695423 1556 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:24:40.178509 kubelet[1556]: I1213 14:24:40.178462 1556 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:24:40.178765 kubelet[1556]: I1213 14:24:40.178729 1556 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:24:40.179183 kubelet[1556]: I1213 14:24:40.179159 1556 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:24:40.244167 kubelet[1556]: I1213 14:24:40.244119 1556 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:24:40.264813 kubelet[1556]: E1213 14:24:40.264753 1556 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:24:40.264995 kubelet[1556]: I1213 14:24:40.264849 1556 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:24:40.271978 kubelet[1556]: I1213 14:24:40.271935 1556 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:24:40.275244 kubelet[1556]: I1213 14:24:40.275211 1556 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:24:40.275790 kubelet[1556]: I1213 14:24:40.275650 1556 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:24:40.276037 kubelet[1556]: I1213 14:24:40.275770 1556 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.71","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:24:40.276271 kubelet[1556]: I1213 14:24:40.276038 1556 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:24:40.276271 kubelet[1556]: I1213 14:24:40.276059 1556 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:24:40.276271 kubelet[1556]: I1213 14:24:40.276230 1556 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:24:40.287375 kubelet[1556]: I1213 14:24:40.287291 1556 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:24:40.287375 kubelet[1556]: I1213 14:24:40.287383 1556 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:24:40.287604 kubelet[1556]: I1213 14:24:40.287439 1556 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:24:40.287604 kubelet[1556]: I1213 14:24:40.287463 1556 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:24:40.296218 kubelet[1556]: E1213 14:24:40.296135 1556 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:40.296386 kubelet[1556]: E1213 14:24:40.296244 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:40.302802 kubelet[1556]: I1213 14:24:40.302767 1556 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:24:40.304822 kubelet[1556]: W1213 14:24:40.304788 1556 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.128.0.71" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:24:40.305047 kubelet[1556]: E1213 14:24:40.305019 1556 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.128.0.71\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:24:40.305371 kubelet[1556]: W1213 14:24:40.305346 1556 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:24:40.305574 kubelet[1556]: E1213 14:24:40.305549 1556 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:24:40.305680 kubelet[1556]: I1213 14:24:40.305617 1556 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:24:40.306944 kubelet[1556]: W1213 14:24:40.306897 1556 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:24:40.307794 kubelet[1556]: I1213 14:24:40.307754 1556 server.go:1269] "Started kubelet" Dec 13 14:24:40.309179 kubelet[1556]: I1213 14:24:40.309106 1556 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:24:40.310712 kubelet[1556]: I1213 14:24:40.310667 1556 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:24:40.312000 audit[1556]: AVC avc: denied { mac_admin } for pid=1556 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:40.312000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:24:40.312000 audit[1556]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00021cf60 a1=c000622600 a2=c00021cf30 a3=25 items=0 ppid=1 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.312000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:24:40.312000 audit[1556]: AVC avc: denied { mac_admin } for pid=1556 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:40.312000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:24:40.312000 audit[1556]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003b3540 a1=c000622618 a2=c00021d020 a3=25 items=0 ppid=1 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.312000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:24:40.314832 kubelet[1556]: I1213 14:24:40.313588 1556 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:24:40.314832 kubelet[1556]: I1213 14:24:40.313665 1556 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:24:40.314832 kubelet[1556]: I1213 14:24:40.313761 1556 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:24:40.316275 kubelet[1556]: I1213 14:24:40.316160 1556 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:24:40.316526 kubelet[1556]: I1213 14:24:40.316485 1556 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:24:40.320988 kubelet[1556]: I1213 14:24:40.319313 1556 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:24:40.322535 kubelet[1556]: I1213 14:24:40.322512 1556 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:24:40.322868 kubelet[1556]: E1213 14:24:40.322839 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:40.323179 kubelet[1556]: I1213 14:24:40.323158 1556 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:24:40.323299 kubelet[1556]: I1213 14:24:40.323264 1556 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:24:40.326074 kubelet[1556]: I1213 14:24:40.326045 1556 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:24:40.326243 kubelet[1556]: I1213 14:24:40.326173 1556 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:24:40.331960 kubelet[1556]: E1213 14:24:40.328272 1556 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:24:40.331960 kubelet[1556]: I1213 14:24:40.329434 1556 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:24:40.332154 kubelet[1556]: E1213 14:24:40.332042 1556 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.71\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:24:40.332359 kubelet[1556]: W1213 14:24:40.332332 1556 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:24:40.332461 kubelet[1556]: E1213 14:24:40.332398 1556 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Dec 13 14:24:40.336213 kubelet[1556]: E1213 14:24:40.333130 1556 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.71.1810c2a74aca2076 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.71,UID:10.128.0.71,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.128.0.71,},FirstTimestamp:2024-12-13 14:24:40.307728502 +0000 UTC m=+0.670475241,LastTimestamp:2024-12-13 14:24:40.307728502 +0000 UTC m=+0.670475241,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.71,}" Dec 13 14:24:40.349818 kubelet[1556]: E1213 14:24:40.349682 1556 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.71.1810c2a74c035b66 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.71,UID:10.128.0.71,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.128.0.71,},FirstTimestamp:2024-12-13 14:24:40.328256358 +0000 UTC m=+0.691003103,LastTimestamp:2024-12-13 14:24:40.328256358 +0000 UTC m=+0.691003103,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.71,}" Dec 13 14:24:40.351423 kubelet[1556]: I1213 14:24:40.351393 1556 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:24:40.351423 kubelet[1556]: I1213 14:24:40.351419 1556 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:24:40.351618 kubelet[1556]: I1213 14:24:40.351441 1556 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:24:40.354124 kubelet[1556]: I1213 14:24:40.354096 1556 policy_none.go:49] "None policy: Start" Dec 13 14:24:40.355764 kubelet[1556]: I1213 14:24:40.355696 1556 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:24:40.355764 kubelet[1556]: I1213 14:24:40.355727 1556 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:24:40.359585 kubelet[1556]: E1213 14:24:40.359369 1556 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.71.1810c2a74d4e3b2a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.71,UID:10.128.0.71,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.128.0.71 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.128.0.71,},FirstTimestamp:2024-12-13 14:24:40.349940522 +0000 UTC m=+0.712687262,LastTimestamp:2024-12-13 14:24:40.349940522 +0000 UTC m=+0.712687262,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.71,}" Dec 13 14:24:40.365864 systemd[1]: Created slice kubepods.slice. Dec 13 14:24:40.371693 kubelet[1556]: E1213 14:24:40.371570 1556 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.71.1810c2a74d4e570a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.71,UID:10.128.0.71,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.128.0.71 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.128.0.71,},FirstTimestamp:2024-12-13 14:24:40.349947658 +0000 UTC m=+0.712694380,LastTimestamp:2024-12-13 14:24:40.349947658 +0000 UTC m=+0.712694380,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.71,}" Dec 13 14:24:40.376614 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:24:40.389302 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:24:40.393915 kubelet[1556]: I1213 14:24:40.393884 1556 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:24:40.394210 kubelet[1556]: I1213 14:24:40.394177 1556 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:24:40.394472 kubelet[1556]: I1213 14:24:40.394457 1556 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:24:40.394642 kubelet[1556]: I1213 14:24:40.394579 1556 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:24:40.392000 audit[1556]: AVC avc: denied { mac_admin } for pid=1556 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:40.392000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:24:40.392000 audit[1556]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d709c0 a1=c000e90a98 a2=c000d70990 a3=25 items=0 ppid=1 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.392000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:24:40.398137 kubelet[1556]: I1213 14:24:40.398117 1556 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:24:40.402000 audit[1572]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.402000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5a784e90 a2=0 a3=7ffd5a784e7c items=0 ppid=1556 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:24:40.409461 kubelet[1556]: E1213 14:24:40.409424 1556 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.71\" not found" Dec 13 14:24:40.409000 audit[1574]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.409000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe2933d2c0 a2=0 a3=7ffe2933d2ac items=0 ppid=1556 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:24:40.416000 audit[1576]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.416000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffead85e9c0 a2=0 a3=7ffead85e9ac items=0 ppid=1556 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:24:40.441000 audit[1581]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.441000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc098debe0 a2=0 a3=7ffc098debcc items=0 ppid=1556 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:24:40.496228 kubelet[1556]: I1213 14:24:40.496176 1556 kubelet_node_status.go:72] "Attempting to register node" node="10.128.0.71" Dec 13 14:24:40.501779 kubelet[1556]: I1213 14:24:40.501743 1556 kubelet_node_status.go:75] "Successfully registered node" node="10.128.0.71" Dec 13 14:24:40.502050 kubelet[1556]: E1213 14:24:40.502025 1556 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.128.0.71\": node \"10.128.0.71\" not found" Dec 13 14:24:40.501000 audit[1586]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.501000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdc9076190 a2=0 a3=7ffdc907617c items=0 ppid=1556 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:24:40.503750 kubelet[1556]: I1213 14:24:40.503708 1556 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:24:40.504000 audit[1587]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1587 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:40.504000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc264259e0 a2=0 a3=7ffc264259cc items=0 ppid=1556 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:24:40.506495 kubelet[1556]: I1213 14:24:40.506469 1556 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:24:40.506635 kubelet[1556]: I1213 14:24:40.506619 1556 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:24:40.506766 kubelet[1556]: I1213 14:24:40.506749 1556 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:24:40.507000 audit[1588]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.507000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0ec870c0 a2=0 a3=7ffc0ec870ac items=0 ppid=1556 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:24:40.509342 kubelet[1556]: E1213 14:24:40.509305 1556 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:24:40.509000 audit[1590]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:40.509000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc43206420 a2=0 a3=7ffc4320640c items=0 ppid=1556 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:24:40.512000 audit[1591]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.512000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc64308ea0 a2=0 a3=7ffc64308e8c items=0 ppid=1556 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:24:40.515000 audit[1592]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:40.515000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff46522e30 a2=0 a3=7fff46522e1c items=0 ppid=1556 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:24:40.515000 audit[1593]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:40.515000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2e291070 a2=0 a3=7ffe2e29105c items=0 ppid=1556 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:24:40.517000 audit[1594]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:40.517000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe78f52ff0 a2=0 a3=7ffe78f52fdc items=0 ppid=1556 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:24:40.520604 kubelet[1556]: E1213 14:24:40.520570 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:40.621736 kubelet[1556]: E1213 14:24:40.621672 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:40.675515 sudo[1440]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:40.675000 audit[1440]: USER_END pid=1440 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.675000 audit[1440]: CRED_DISP pid=1440 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.718795 sshd[1434]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:40.720000 audit[1434]: USER_END pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:40.720000 audit[1434]: CRED_DISP pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:40.723140 kubelet[1556]: E1213 14:24:40.722619 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:40.724679 systemd[1]: sshd@6-10.128.0.71:22-139.178.68.195:48258.service: Deactivated successfully. Dec 13 14:24:40.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.71:22-139.178.68.195:48258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.725851 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:24:40.726777 systemd-logind[1216]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:24:40.728285 systemd-logind[1216]: Removed session 7. Dec 13 14:24:40.823553 kubelet[1556]: E1213 14:24:40.823489 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:40.924210 kubelet[1556]: E1213 14:24:40.924126 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:41.025154 kubelet[1556]: E1213 14:24:41.024895 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:41.125707 kubelet[1556]: E1213 14:24:41.125641 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:41.182221 kubelet[1556]: I1213 14:24:41.182151 1556 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:24:41.182446 kubelet[1556]: W1213 14:24:41.182417 1556 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:24:41.226766 kubelet[1556]: E1213 14:24:41.226697 1556 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.71\" not found" Dec 13 14:24:41.297174 kubelet[1556]: I1213 14:24:41.296759 1556 apiserver.go:52] "Watching apiserver" Dec 13 14:24:41.297174 kubelet[1556]: E1213 14:24:41.296762 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:41.306813 kubelet[1556]: E1213 14:24:41.306101 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:41.313305 systemd[1]: Created slice kubepods-besteffort-pode0b50128_949a_42a5_9139_1f9be7ee0356.slice. Dec 13 14:24:41.323997 kubelet[1556]: I1213 14:24:41.323727 1556 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:24:41.329080 kubelet[1556]: I1213 14:24:41.329046 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5f856431-3243-4ea4-a981-7901f99e53cc-tigera-ca-bundle\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.329353 kubelet[1556]: I1213 14:24:41.329327 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-var-run-calico\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.329526 kubelet[1556]: I1213 14:24:41.329493 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-cni-bin-dir\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.329655 systemd[1]: Created slice kubepods-besteffort-pod5f856431_3243_4ea4_a981_7901f99e53cc.slice. Dec 13 14:24:41.330323 kubelet[1556]: I1213 14:24:41.330294 1556 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:24:41.330483 kubelet[1556]: I1213 14:24:41.330459 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-cni-net-dir\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.330705 kubelet[1556]: I1213 14:24:41.330680 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xk66v\" (UniqueName: \"kubernetes.io/projected/5f856431-3243-4ea4-a981-7901f99e53cc-kube-api-access-xk66v\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.330848 env[1231]: time="2024-12-13T14:24:41.330796390Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:24:41.331376 kubelet[1556]: I1213 14:24:41.331076 1556 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:24:41.331497 kubelet[1556]: I1213 14:24:41.331471 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/409c84be-1dd3-45f0-acf6-5a3813da3839-varrun\") pod \"csi-node-driver-drh82\" (UID: \"409c84be-1dd3-45f0-acf6-5a3813da3839\") " pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:41.331648 kubelet[1556]: I1213 14:24:41.331626 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2zjrs\" (UniqueName: \"kubernetes.io/projected/e0b50128-949a-42a5-9139-1f9be7ee0356-kube-api-access-2zjrs\") pod \"kube-proxy-fm25h\" (UID: \"e0b50128-949a-42a5-9139-1f9be7ee0356\") " pod="kube-system/kube-proxy-fm25h" Dec 13 14:24:41.331783 kubelet[1556]: I1213 14:24:41.331760 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-policysync\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.331935 kubelet[1556]: I1213 14:24:41.331879 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-xtables-lock\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.332144 kubelet[1556]: I1213 14:24:41.332099 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-cni-log-dir\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.332303 kubelet[1556]: I1213 14:24:41.332281 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e0b50128-949a-42a5-9139-1f9be7ee0356-kube-proxy\") pod \"kube-proxy-fm25h\" (UID: \"e0b50128-949a-42a5-9139-1f9be7ee0356\") " pod="kube-system/kube-proxy-fm25h" Dec 13 14:24:41.332437 kubelet[1556]: I1213 14:24:41.332419 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e0b50128-949a-42a5-9139-1f9be7ee0356-xtables-lock\") pod \"kube-proxy-fm25h\" (UID: \"e0b50128-949a-42a5-9139-1f9be7ee0356\") " pod="kube-system/kube-proxy-fm25h" Dec 13 14:24:41.332572 kubelet[1556]: I1213 14:24:41.332551 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-lib-modules\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.332716 kubelet[1556]: I1213 14:24:41.332674 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-var-lib-calico\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.332837 kubelet[1556]: I1213 14:24:41.332816 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5f856431-3243-4ea4-a981-7901f99e53cc-flexvol-driver-host\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.332979 kubelet[1556]: I1213 14:24:41.332957 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/409c84be-1dd3-45f0-acf6-5a3813da3839-kubelet-dir\") pod \"csi-node-driver-drh82\" (UID: \"409c84be-1dd3-45f0-acf6-5a3813da3839\") " pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:41.333149 kubelet[1556]: I1213 14:24:41.333126 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/409c84be-1dd3-45f0-acf6-5a3813da3839-socket-dir\") pod \"csi-node-driver-drh82\" (UID: \"409c84be-1dd3-45f0-acf6-5a3813da3839\") " pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:41.333292 kubelet[1556]: I1213 14:24:41.333271 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/409c84be-1dd3-45f0-acf6-5a3813da3839-registration-dir\") pod \"csi-node-driver-drh82\" (UID: \"409c84be-1dd3-45f0-acf6-5a3813da3839\") " pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:41.333413 kubelet[1556]: I1213 14:24:41.333393 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e0b50128-949a-42a5-9139-1f9be7ee0356-lib-modules\") pod \"kube-proxy-fm25h\" (UID: \"e0b50128-949a-42a5-9139-1f9be7ee0356\") " pod="kube-system/kube-proxy-fm25h" Dec 13 14:24:41.333701 kubelet[1556]: I1213 14:24:41.333677 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5f856431-3243-4ea4-a981-7901f99e53cc-node-certs\") pod \"calico-node-vwh6n\" (UID: \"5f856431-3243-4ea4-a981-7901f99e53cc\") " pod="calico-system/calico-node-vwh6n" Dec 13 14:24:41.333997 kubelet[1556]: I1213 14:24:41.333958 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hcmc5\" (UniqueName: \"kubernetes.io/projected/409c84be-1dd3-45f0-acf6-5a3813da3839-kube-api-access-hcmc5\") pod \"csi-node-driver-drh82\" (UID: \"409c84be-1dd3-45f0-acf6-5a3813da3839\") " pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:41.435524 kubelet[1556]: I1213 14:24:41.435480 1556 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:24:41.436668 kubelet[1556]: E1213 14:24:41.436625 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.437018 kubelet[1556]: W1213 14:24:41.436983 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.437122 kubelet[1556]: E1213 14:24:41.437040 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.438403 kubelet[1556]: E1213 14:24:41.438356 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.438403 kubelet[1556]: W1213 14:24:41.438400 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.438593 kubelet[1556]: E1213 14:24:41.438542 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.438821 kubelet[1556]: E1213 14:24:41.438799 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.438821 kubelet[1556]: W1213 14:24:41.438820 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.438966 kubelet[1556]: E1213 14:24:41.438947 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.439246 kubelet[1556]: E1213 14:24:41.439226 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.439246 kubelet[1556]: W1213 14:24:41.439245 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.439399 kubelet[1556]: E1213 14:24:41.439365 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.439647 kubelet[1556]: E1213 14:24:41.439614 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.439647 kubelet[1556]: W1213 14:24:41.439635 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.439790 kubelet[1556]: E1213 14:24:41.439763 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.440050 kubelet[1556]: E1213 14:24:41.440027 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.440050 kubelet[1556]: W1213 14:24:41.440048 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.440226 kubelet[1556]: E1213 14:24:41.440166 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.440495 kubelet[1556]: E1213 14:24:41.440464 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.440495 kubelet[1556]: W1213 14:24:41.440494 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.440655 kubelet[1556]: E1213 14:24:41.440626 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.440914 kubelet[1556]: E1213 14:24:41.440894 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.440914 kubelet[1556]: W1213 14:24:41.440913 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.441056 kubelet[1556]: E1213 14:24:41.441040 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.441312 kubelet[1556]: E1213 14:24:41.441291 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.441312 kubelet[1556]: W1213 14:24:41.441310 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.441465 kubelet[1556]: E1213 14:24:41.441444 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.441705 kubelet[1556]: E1213 14:24:41.441685 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.441705 kubelet[1556]: W1213 14:24:41.441703 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.441881 kubelet[1556]: E1213 14:24:41.441861 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.442121 kubelet[1556]: E1213 14:24:41.442103 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.442121 kubelet[1556]: W1213 14:24:41.442121 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.442295 kubelet[1556]: E1213 14:24:41.442275 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.442571 kubelet[1556]: E1213 14:24:41.442551 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.442682 kubelet[1556]: W1213 14:24:41.442570 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.442751 kubelet[1556]: E1213 14:24:41.442703 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.442972 kubelet[1556]: E1213 14:24:41.442952 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.442972 kubelet[1556]: W1213 14:24:41.442970 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.443102 kubelet[1556]: E1213 14:24:41.443090 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.443357 kubelet[1556]: E1213 14:24:41.443337 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.443457 kubelet[1556]: W1213 14:24:41.443356 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.443519 kubelet[1556]: E1213 14:24:41.443502 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.443758 kubelet[1556]: E1213 14:24:41.443738 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.443758 kubelet[1556]: W1213 14:24:41.443756 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.443891 kubelet[1556]: E1213 14:24:41.443874 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.444223 kubelet[1556]: E1213 14:24:41.444174 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.444223 kubelet[1556]: W1213 14:24:41.444221 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.458262 kubelet[1556]: E1213 14:24:41.445105 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.458262 kubelet[1556]: W1213 14:24:41.445123 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.458262 kubelet[1556]: E1213 14:24:41.451837 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.458262 kubelet[1556]: E1213 14:24:41.451877 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.458262 kubelet[1556]: E1213 14:24:41.452200 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.458262 kubelet[1556]: W1213 14:24:41.452218 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.458262 kubelet[1556]: E1213 14:24:41.455809 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.458262 kubelet[1556]: W1213 14:24:41.455836 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.458919 kubelet[1556]: E1213 14:24:41.458893 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.459045 kubelet[1556]: E1213 14:24:41.459027 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.460592 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464223 kubelet[1556]: W1213 14:24:41.460629 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.460814 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.461019 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464223 kubelet[1556]: W1213 14:24:41.461032 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.461139 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.461389 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464223 kubelet[1556]: W1213 14:24:41.461403 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.461512 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464223 kubelet[1556]: E1213 14:24:41.461704 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464828 kubelet[1556]: W1213 14:24:41.461716 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.464828 kubelet[1556]: E1213 14:24:41.461820 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464828 kubelet[1556]: E1213 14:24:41.462047 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464828 kubelet[1556]: W1213 14:24:41.462057 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.464828 kubelet[1556]: E1213 14:24:41.462167 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464828 kubelet[1556]: E1213 14:24:41.462403 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464828 kubelet[1556]: W1213 14:24:41.462415 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.464828 kubelet[1556]: E1213 14:24:41.462510 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.464828 kubelet[1556]: E1213 14:24:41.462719 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.464828 kubelet[1556]: W1213 14:24:41.462728 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.465362 kubelet[1556]: E1213 14:24:41.462819 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.465362 kubelet[1556]: E1213 14:24:41.463011 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.465362 kubelet[1556]: W1213 14:24:41.463020 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.465362 kubelet[1556]: E1213 14:24:41.463111 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.465362 kubelet[1556]: E1213 14:24:41.463397 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.465362 kubelet[1556]: W1213 14:24:41.463409 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.465362 kubelet[1556]: E1213 14:24:41.463522 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.465362 kubelet[1556]: E1213 14:24:41.465277 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.465362 kubelet[1556]: W1213 14:24:41.465299 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.465809 kubelet[1556]: E1213 14:24:41.465472 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.465809 kubelet[1556]: E1213 14:24:41.465698 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.465809 kubelet[1556]: W1213 14:24:41.465713 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.465953 kubelet[1556]: E1213 14:24:41.465848 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.466372 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471274 kubelet[1556]: W1213 14:24:41.466390 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.466529 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.466719 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471274 kubelet[1556]: W1213 14:24:41.466730 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.466851 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.468036 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471274 kubelet[1556]: W1213 14:24:41.468051 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.468162 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471274 kubelet[1556]: E1213 14:24:41.468395 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471890 kubelet[1556]: W1213 14:24:41.468407 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.471890 kubelet[1556]: E1213 14:24:41.468541 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471890 kubelet[1556]: E1213 14:24:41.469296 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471890 kubelet[1556]: W1213 14:24:41.469310 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.471890 kubelet[1556]: E1213 14:24:41.469465 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471890 kubelet[1556]: E1213 14:24:41.469660 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471890 kubelet[1556]: W1213 14:24:41.469674 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.471890 kubelet[1556]: E1213 14:24:41.469808 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.471890 kubelet[1556]: E1213 14:24:41.470006 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.471890 kubelet[1556]: W1213 14:24:41.470019 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.472369 kubelet[1556]: E1213 14:24:41.470119 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.472369 kubelet[1556]: E1213 14:24:41.470338 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.472369 kubelet[1556]: W1213 14:24:41.470351 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.472369 kubelet[1556]: E1213 14:24:41.470478 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.472369 kubelet[1556]: E1213 14:24:41.470708 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.472369 kubelet[1556]: W1213 14:24:41.470721 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.472369 kubelet[1556]: E1213 14:24:41.470736 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.478475 kubelet[1556]: E1213 14:24:41.478447 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.478684 kubelet[1556]: W1213 14:24:41.478658 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.478806 kubelet[1556]: E1213 14:24:41.478787 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.479647 kubelet[1556]: E1213 14:24:41.479613 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.479647 kubelet[1556]: W1213 14:24:41.479644 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.479811 kubelet[1556]: E1213 14:24:41.479667 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.480399 kubelet[1556]: E1213 14:24:41.480367 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.480399 kubelet[1556]: W1213 14:24:41.480391 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.480554 kubelet[1556]: E1213 14:24:41.480412 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.490625 kubelet[1556]: E1213 14:24:41.488997 1556 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:24:41.490625 kubelet[1556]: W1213 14:24:41.489022 1556 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:24:41.490625 kubelet[1556]: E1213 14:24:41.489048 1556 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:24:41.626268 env[1231]: time="2024-12-13T14:24:41.626088624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fm25h,Uid:e0b50128-949a-42a5-9139-1f9be7ee0356,Namespace:kube-system,Attempt:0,}" Dec 13 14:24:41.637382 env[1231]: time="2024-12-13T14:24:41.637324072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vwh6n,Uid:5f856431-3243-4ea4-a981-7901f99e53cc,Namespace:calico-system,Attempt:0,}" Dec 13 14:24:42.224114 env[1231]: time="2024-12-13T14:24:42.224046859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.225615 env[1231]: time="2024-12-13T14:24:42.225574832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.231700 env[1231]: time="2024-12-13T14:24:42.231608573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.232898 env[1231]: time="2024-12-13T14:24:42.232834718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.233931 env[1231]: time="2024-12-13T14:24:42.233890756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.236322 env[1231]: time="2024-12-13T14:24:42.236274762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.237273 env[1231]: time="2024-12-13T14:24:42.237233559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.239781 env[1231]: time="2024-12-13T14:24:42.239721550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:42.274317 env[1231]: time="2024-12-13T14:24:42.274234862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:42.274609 env[1231]: time="2024-12-13T14:24:42.274552015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:42.274831 env[1231]: time="2024-12-13T14:24:42.274773339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:42.275233 env[1231]: time="2024-12-13T14:24:42.275148145Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb pid=1650 runtime=io.containerd.runc.v2 Dec 13 14:24:42.278719 env[1231]: time="2024-12-13T14:24:42.278633177Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:42.278719 env[1231]: time="2024-12-13T14:24:42.278683590Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:42.278918 env[1231]: time="2024-12-13T14:24:42.278701251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:42.279213 env[1231]: time="2024-12-13T14:24:42.279137416Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbd95415eacfc1596e88c3aa36257e006f5fc563decbac6f7dd91687429bb891 pid=1670 runtime=io.containerd.runc.v2 Dec 13 14:24:42.298098 kubelet[1556]: E1213 14:24:42.298022 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:42.306571 systemd[1]: Started cri-containerd-59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb.scope. Dec 13 14:24:42.317456 systemd[1]: Started cri-containerd-bbd95415eacfc1596e88c3aa36257e006f5fc563decbac6f7dd91687429bb891.scope. Dec 13 14:24:42.349087 kernel: kauditd_printk_skb: 280 callbacks suppressed Dec 13 14:24:42.349239 kernel: audit: type=1400 audit(1734099882.342:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.423639 kernel: audit: type=1400 audit(1734099882.342:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.423793 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:24:42.423864 kernel: audit: type=1400 audit(1734099882.342:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.423900 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.451751 kernel: audit: type=1400 audit(1734099882.342:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.451920 kernel: audit: backlog limit exceeded Dec 13 14:24:42.451965 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.468531 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:24:42.468649 kernel: audit: type=1400 audit(1734099882.342:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.486165 env[1231]: time="2024-12-13T14:24:42.486015194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vwh6n,Uid:5f856431-3243-4ea4-a981-7901f99e53cc,Namespace:calico-system,Attempt:0,} returns sandbox id \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\"" Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.368000 audit: BPF prog-id=61 op=LOAD Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1650 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539656564393336653831346564373361326437306238346237643162 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1650 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539656564393336653831346564373361326437306238346237643162 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.370000 audit: BPF prog-id=62 op=LOAD Dec 13 14:24:42.370000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cc600 items=0 ppid=1650 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539656564393336653831346564373361326437306238346237643162 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit: BPF prog-id=63 op=LOAD Dec 13 14:24:42.371000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cc648 items=0 ppid=1650 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539656564393336653831346564373361326437306238346237643162 Dec 13 14:24:42.371000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:24:42.371000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { perfmon } for pid=1676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit[1676]: AVC avc: denied { bpf } for pid=1676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.371000 audit: BPF prog-id=64 op=LOAD Dec 13 14:24:42.371000 audit[1676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cca58 items=0 ppid=1650 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539656564393336653831346564373361326437306238346237643162 Dec 13 14:24:42.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496406 env[1231]: time="2024-12-13T14:24:42.496352919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:24:42.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.491000 audit: BPF prog-id=65 op=LOAD Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1670 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643935343135656163666331353936653838633361613336323537 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=1670 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643935343135656163666331353936653838633361613336323537 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit: BPF prog-id=66 op=LOAD Dec 13 14:24:42.495000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000327d00 items=0 ppid=1670 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643935343135656163666331353936653838633361613336323537 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.495000 audit: BPF prog-id=67 op=LOAD Dec 13 14:24:42.495000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000327d48 items=0 ppid=1670 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643935343135656163666331353936653838633361613336323537 Dec 13 14:24:42.495000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:24:42.496000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:42.496000 audit: BPF prog-id=68 op=LOAD Dec 13 14:24:42.496000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00037e158 items=0 ppid=1670 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643935343135656163666331353936653838633361613336323537 Dec 13 14:24:42.505663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2633481226.mount: Deactivated successfully. Dec 13 14:24:42.513030 kubelet[1556]: E1213 14:24:42.511933 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:42.523866 env[1231]: time="2024-12-13T14:24:42.523796073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fm25h,Uid:e0b50128-949a-42a5-9139-1f9be7ee0356,Namespace:kube-system,Attempt:0,} returns sandbox id \"bbd95415eacfc1596e88c3aa36257e006f5fc563decbac6f7dd91687429bb891\"" Dec 13 14:24:43.298631 kubelet[1556]: E1213 14:24:43.298555 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:43.489435 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2479890073.mount: Deactivated successfully. Dec 13 14:24:43.654430 env[1231]: time="2024-12-13T14:24:43.654363382Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:43.658360 env[1231]: time="2024-12-13T14:24:43.658302657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:43.661106 env[1231]: time="2024-12-13T14:24:43.661056638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:43.663526 env[1231]: time="2024-12-13T14:24:43.663476644Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:43.664291 env[1231]: time="2024-12-13T14:24:43.664246317Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:24:43.666923 env[1231]: time="2024-12-13T14:24:43.666870472Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:24:43.667966 env[1231]: time="2024-12-13T14:24:43.667921467Z" level=info msg="CreateContainer within sandbox \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:24:43.691987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2442912713.mount: Deactivated successfully. Dec 13 14:24:43.705052 env[1231]: time="2024-12-13T14:24:43.704991860Z" level=info msg="CreateContainer within sandbox \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63\"" Dec 13 14:24:43.706069 env[1231]: time="2024-12-13T14:24:43.706014146Z" level=info msg="StartContainer for \"acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63\"" Dec 13 14:24:43.735916 systemd[1]: Started cri-containerd-acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63.scope. Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f6aac0a8d48 items=0 ppid=1650 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646561356531316432306363353037633165363331623032643430 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit: BPF prog-id=69 op=LOAD Dec 13 14:24:43.773000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b52d8 items=0 ppid=1650 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646561356531316432306363353037633165363331623032643430 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit: BPF prog-id=70 op=LOAD Dec 13 14:24:43.773000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b5328 items=0 ppid=1650 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646561356531316432306363353037633165363331623032643430 Dec 13 14:24:43.773000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:24:43.773000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:43.773000 audit: BPF prog-id=71 op=LOAD Dec 13 14:24:43.773000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b53b8 items=0 ppid=1650 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646561356531316432306363353037633165363331623032643430 Dec 13 14:24:43.799961 env[1231]: time="2024-12-13T14:24:43.799891777Z" level=info msg="StartContainer for \"acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63\" returns successfully" Dec 13 14:24:43.814466 systemd[1]: cri-containerd-acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63.scope: Deactivated successfully. Dec 13 14:24:43.816000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:24:43.846342 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63-rootfs.mount: Deactivated successfully. Dec 13 14:24:43.905118 env[1231]: time="2024-12-13T14:24:43.904605081Z" level=info msg="shim disconnected" id=acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63 Dec 13 14:24:43.905118 env[1231]: time="2024-12-13T14:24:43.904884183Z" level=warning msg="cleaning up after shim disconnected" id=acdea5e11d20cc507c1e631b02d4078311ac2b1942f75b6dd00542200825bf63 namespace=k8s.io Dec 13 14:24:43.905118 env[1231]: time="2024-12-13T14:24:43.904910942Z" level=info msg="cleaning up dead shim" Dec 13 14:24:43.919958 env[1231]: time="2024-12-13T14:24:43.919902799Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:24:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1775 runtime=io.containerd.runc.v2\n" Dec 13 14:24:44.299589 kubelet[1556]: E1213 14:24:44.299417 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:44.511384 kubelet[1556]: E1213 14:24:44.510551 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:44.901168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2564755247.mount: Deactivated successfully. Dec 13 14:24:45.299805 kubelet[1556]: E1213 14:24:45.299648 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:45.668799 env[1231]: time="2024-12-13T14:24:45.668717376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:45.672327 env[1231]: time="2024-12-13T14:24:45.672270697Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:45.674828 env[1231]: time="2024-12-13T14:24:45.674771772Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:45.677421 env[1231]: time="2024-12-13T14:24:45.677373707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:45.677970 env[1231]: time="2024-12-13T14:24:45.677920392Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:24:45.679812 env[1231]: time="2024-12-13T14:24:45.679774366Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:24:45.680791 env[1231]: time="2024-12-13T14:24:45.680749634Z" level=info msg="CreateContainer within sandbox \"bbd95415eacfc1596e88c3aa36257e006f5fc563decbac6f7dd91687429bb891\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:24:45.704998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1401057833.mount: Deactivated successfully. Dec 13 14:24:45.711437 env[1231]: time="2024-12-13T14:24:45.711373232Z" level=info msg="CreateContainer within sandbox \"bbd95415eacfc1596e88c3aa36257e006f5fc563decbac6f7dd91687429bb891\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"df0c8c012cf754bd6ad5c80ace4b191c14af2ac03316e28257e7dbac22eb9b3c\"" Dec 13 14:24:45.712424 env[1231]: time="2024-12-13T14:24:45.712373274Z" level=info msg="StartContainer for \"df0c8c012cf754bd6ad5c80ace4b191c14af2ac03316e28257e7dbac22eb9b3c\"" Dec 13 14:24:45.743757 systemd[1]: Started cri-containerd-df0c8c012cf754bd6ad5c80ace4b191c14af2ac03316e28257e7dbac22eb9b3c.scope. Dec 13 14:24:45.766000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.766000 audit[1799]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fdd7e5ea888 items=0 ppid=1670 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306338633031326366373534626436616435633830616365346231 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.767000 audit: BPF prog-id=72 op=LOAD Dec 13 14:24:45.767000 audit[1799]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000355ea8 items=0 ppid=1670 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306338633031326366373534626436616435633830616365346231 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.768000 audit: BPF prog-id=73 op=LOAD Dec 13 14:24:45.768000 audit[1799]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000355ef8 items=0 ppid=1670 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306338633031326366373534626436616435633830616365346231 Dec 13 14:24:45.769000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:24:45.769000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:45.769000 audit: BPF prog-id=74 op=LOAD Dec 13 14:24:45.769000 audit[1799]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000355f88 items=0 ppid=1670 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466306338633031326366373534626436616435633830616365346231 Dec 13 14:24:45.794593 env[1231]: time="2024-12-13T14:24:45.794521179Z" level=info msg="StartContainer for \"df0c8c012cf754bd6ad5c80ace4b191c14af2ac03316e28257e7dbac22eb9b3c\" returns successfully" Dec 13 14:24:45.940000 audit[1861]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:45.940000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde17fa380 a2=0 a3=7ffde17fa36c items=0 ppid=1811 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:24:45.940000 audit[1862]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:45.940000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe64d711f0 a2=0 a3=a194a3253fcdcfbd items=0 ppid=1811 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:24:45.942000 audit[1863]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:45.942000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbd792a70 a2=0 a3=7fffbd792a5c items=0 ppid=1811 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:24:45.945000 audit[1864]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:45.945000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc970dc90 a2=0 a3=7ffdc970dc7c items=0 ppid=1811 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:24:45.946000 audit[1865]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:45.946000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd643d3b00 a2=0 a3=7ffd643d3aec items=0 ppid=1811 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:24:45.948000 audit[1866]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:45.948000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2ef7cc20 a2=0 a3=7ffe2ef7cc0c items=0 ppid=1811 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:24:46.049000 audit[1867]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.049000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6eb90e70 a2=0 a3=7ffc6eb90e5c items=0 ppid=1811 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:24:46.053000 audit[1869]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.053000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffbb748ca0 a2=0 a3=7fffbb748c8c items=0 ppid=1811 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:24:46.059000 audit[1872]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.059000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff19a6c670 a2=0 a3=7fff19a6c65c items=0 ppid=1811 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:24:46.061000 audit[1873]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.061000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff367c21c0 a2=0 a3=7fff367c21ac items=0 ppid=1811 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:24:46.064000 audit[1875]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.064000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd6deddf0 a2=0 a3=7ffcd6dedddc items=0 ppid=1811 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:24:46.066000 audit[1876]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.066000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5fcbb840 a2=0 a3=7ffe5fcbb82c items=0 ppid=1811 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:24:46.072000 audit[1878]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.072000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc717266f0 a2=0 a3=7ffc717266dc items=0 ppid=1811 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:24:46.077000 audit[1881]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.077000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd39ed0310 a2=0 a3=7ffd39ed02fc items=0 ppid=1811 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:24:46.079000 audit[1882]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.079000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc8104a10 a2=0 a3=7ffdc81049fc items=0 ppid=1811 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:24:46.083000 audit[1884]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.083000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa78154a0 a2=0 a3=7fffa781548c items=0 ppid=1811 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:24:46.085000 audit[1885]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.085000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0d463b40 a2=0 a3=7fff0d463b2c items=0 ppid=1811 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:24:46.088000 audit[1887]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.088000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdc5613b0 a2=0 a3=7fffdc56139c items=0 ppid=1811 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:24:46.094000 audit[1890]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.094000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc76f4d6e0 a2=0 a3=7ffc76f4d6cc items=0 ppid=1811 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:24:46.100000 audit[1893]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.100000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf64b34c0 a2=0 a3=7ffdf64b34ac items=0 ppid=1811 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:24:46.104000 audit[1894]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.104000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1d8bcb20 a2=0 a3=7ffd1d8bcb0c items=0 ppid=1811 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:24:46.109000 audit[1896]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.109000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffefcf39a90 a2=0 a3=7ffefcf39a7c items=0 ppid=1811 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:24:46.141000 audit[1900]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.141000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeecf78070 a2=0 a3=7ffeecf7805c items=0 ppid=1811 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:24:46.143000 audit[1901]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.143000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdea562200 a2=0 a3=7ffdea5621ec items=0 ppid=1811 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:24:46.147000 audit[1903]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:46.147000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff346c3f00 a2=0 a3=7fff346c3eec items=0 ppid=1811 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:24:46.170000 audit[1909]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:46.170000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe2094ee70 a2=0 a3=7ffe2094ee5c items=0 ppid=1811 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:46.207000 audit[1909]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:46.207000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7ffe2094ee70 a2=0 a3=7ffe2094ee5c items=0 ppid=1811 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:46.229000 audit[1918]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.229000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb3c232e0 a2=0 a3=7ffcb3c232cc items=0 ppid=1811 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:24:46.234000 audit[1920]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.234000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce9ee7d40 a2=0 a3=7ffce9ee7d2c items=0 ppid=1811 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:24:46.240000 audit[1923]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.240000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee36d8c30 a2=0 a3=7ffee36d8c1c items=0 ppid=1811 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:24:46.241000 audit[1924]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.241000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8bab8150 a2=0 a3=7ffd8bab813c items=0 ppid=1811 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:24:46.245000 audit[1926]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.245000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6d007430 a2=0 a3=7ffc6d00741c items=0 ppid=1811 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:24:46.247000 audit[1927]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.247000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe19106d30 a2=0 a3=7ffe19106d1c items=0 ppid=1811 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:24:46.251000 audit[1929]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.251000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff0b46eb80 a2=0 a3=7fff0b46eb6c items=0 ppid=1811 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:24:46.257000 audit[1932]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.257000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffffec13b80 a2=0 a3=7ffffec13b6c items=0 ppid=1811 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:24:46.259000 audit[1933]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.259000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffebe3f810 a2=0 a3=7fffebe3f7fc items=0 ppid=1811 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:24:46.263000 audit[1935]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.263000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7c42ead0 a2=0 a3=7fff7c42eabc items=0 ppid=1811 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:24:46.265000 audit[1936]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.265000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff15e77e70 a2=0 a3=7fff15e77e5c items=0 ppid=1811 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:24:46.270000 audit[1938]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.270000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff433a2780 a2=0 a3=7fff433a276c items=0 ppid=1811 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:24:46.276000 audit[1941]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.276000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf927a5d0 a2=0 a3=7ffdf927a5bc items=0 ppid=1811 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:24:46.282000 audit[1944]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.282000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcdf1a520 a2=0 a3=7ffdcdf1a50c items=0 ppid=1811 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:24:46.284000 audit[1945]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.284000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcfa74d6c0 a2=0 a3=7ffcfa74d6ac items=0 ppid=1811 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:24:46.288000 audit[1947]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.288000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd9a59d0f0 a2=0 a3=7ffd9a59d0dc items=0 ppid=1811 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:24:46.295000 audit[1950]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.295000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe9b3914d0 a2=0 a3=7ffe9b3914bc items=0 ppid=1811 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:24:46.297000 audit[1951]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.297000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1c2c5620 a2=0 a3=7fff1c2c560c items=0 ppid=1811 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:24:46.300044 kubelet[1556]: E1213 14:24:46.299989 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:46.303000 audit[1953]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.303000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff0a1cc480 a2=0 a3=7fff0a1cc46c items=0 ppid=1811 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:24:46.305000 audit[1954]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.305000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff335abae0 a2=0 a3=7fff335abacc items=0 ppid=1811 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:24:46.309000 audit[1956]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.309000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd31b503a0 a2=0 a3=7ffd31b5038c items=0 ppid=1811 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:24:46.322000 audit[1959]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:24:46.322000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc09681cb0 a2=0 a3=7ffc09681c9c items=0 ppid=1811 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:24:46.329000 audit[1961]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:24:46.329000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc25421ca0 a2=0 a3=7ffc25421c8c items=0 ppid=1811 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.329000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:46.329000 audit[1961]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:24:46.329000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc25421ca0 a2=0 a3=7ffc25421c8c items=0 ppid=1811 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.329000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:46.512779 kubelet[1556]: E1213 14:24:46.510259 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:47.300547 kubelet[1556]: E1213 14:24:47.300494 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:48.301462 kubelet[1556]: E1213 14:24:48.301353 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:48.511547 kubelet[1556]: E1213 14:24:48.509930 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:49.302077 kubelet[1556]: E1213 14:24:49.301920 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:49.774689 env[1231]: time="2024-12-13T14:24:49.774612655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.777889 env[1231]: time="2024-12-13T14:24:49.777834413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.780140 env[1231]: time="2024-12-13T14:24:49.780096699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.782561 env[1231]: time="2024-12-13T14:24:49.782514302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.783400 env[1231]: time="2024-12-13T14:24:49.783347778Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:24:49.787180 env[1231]: time="2024-12-13T14:24:49.787127015Z" level=info msg="CreateContainer within sandbox \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:24:49.805428 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1817616521.mount: Deactivated successfully. Dec 13 14:24:49.813833 env[1231]: time="2024-12-13T14:24:49.813776074Z" level=info msg="CreateContainer within sandbox \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748\"" Dec 13 14:24:49.815267 env[1231]: time="2024-12-13T14:24:49.815206497Z" level=info msg="StartContainer for \"2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748\"" Dec 13 14:24:49.847165 systemd[1]: Started cri-containerd-2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748.scope. Dec 13 14:24:49.858450 systemd[1]: run-containerd-runc-k8s.io-2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748-runc.HItrH2.mount: Deactivated successfully. Dec 13 14:24:49.906918 kernel: kauditd_printk_skb: 348 callbacks suppressed Dec 13 14:24:49.907125 kernel: audit: type=1400 audit(1734099889.879:536): avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc6154d7608 items=0 ppid=1650 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:49.940568 kernel: audit: type=1300 audit(1734099889.879:536): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc6154d7608 items=0 ppid=1650 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:49.940822 kernel: audit: type=1327 audit(1734099889.879:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265373533363665376537343465666433326233333032623032336331 Dec 13 14:24:49.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265373533363665376537343465666433326233333032623032336331 Dec 13 14:24:49.990128 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:50.033158 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:50.033379 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:50.033441 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:50.066809 env[1231]: time="2024-12-13T14:24:50.066737948Z" level=info msg="StartContainer for \"2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748\" returns successfully" Dec 13 14:24:50.096169 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:50.096328 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.879000 audit: BPF prog-id=75 op=LOAD Dec 13 14:24:49.879000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ba2f8 items=0 ppid=1650 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:49.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265373533363665376537343465666433326233333032623032336331 Dec 13 14:24:50.118266 kernel: audit: type=1400 audit(1734099889.879:537): avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit: BPF prog-id=76 op=LOAD Dec 13 14:24:49.906000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ba348 items=0 ppid=1650 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:49.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265373533363665376537343465666433326233333032623032336331 Dec 13 14:24:49.906000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:24:49.906000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:49.906000 audit: BPF prog-id=77 op=LOAD Dec 13 14:24:49.906000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ba3d8 items=0 ppid=1650 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:49.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265373533363665376537343465666433326233333032623032336331 Dec 13 14:24:50.000000 audit[1988]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:50.000000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcc1931c60 a2=0 a3=7ffcc1931c4c items=0 ppid=1811 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:50.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:50.052000 audit[1988]: NETFILTER_CFG table=nat:66 family=2 entries=34 op=nft_register_chain pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:50.052000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcc1931c60 a2=0 a3=7ffcc1931c4c items=0 ppid=1811 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:50.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:50.303261 kubelet[1556]: E1213 14:24:50.302093 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:50.511097 kubelet[1556]: E1213 14:24:50.511032 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:50.564779 kubelet[1556]: I1213 14:24:50.564576 1556 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fm25h" podStartSLOduration=7.410483686 podStartE2EDuration="10.564549182s" podCreationTimestamp="2024-12-13 14:24:40 +0000 UTC" firstStartedPulling="2024-12-13 14:24:42.525103733 +0000 UTC m=+2.887850466" lastFinishedPulling="2024-12-13 14:24:45.679169226 +0000 UTC m=+6.041915962" observedRunningTime="2024-12-13 14:24:46.549269289 +0000 UTC m=+6.912016034" watchObservedRunningTime="2024-12-13 14:24:50.564549182 +0000 UTC m=+10.927295925" Dec 13 14:24:50.919093 env[1231]: time="2024-12-13T14:24:50.918978655Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:24:50.921366 kubelet[1556]: I1213 14:24:50.921334 1556 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:24:50.924524 systemd[1]: cri-containerd-2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748.scope: Deactivated successfully. Dec 13 14:24:50.928000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:24:50.954781 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748-rootfs.mount: Deactivated successfully. Dec 13 14:24:51.302822 kubelet[1556]: E1213 14:24:51.302658 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:52.115275 env[1231]: time="2024-12-13T14:24:52.115206046Z" level=info msg="shim disconnected" id=2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748 Dec 13 14:24:52.115275 env[1231]: time="2024-12-13T14:24:52.115276132Z" level=warning msg="cleaning up after shim disconnected" id=2e75366e7e744efd32b3302b023c1b550ade4ad1c33abdb8f144d7b2ba4a6748 namespace=k8s.io Dec 13 14:24:52.115995 env[1231]: time="2024-12-13T14:24:52.115292372Z" level=info msg="cleaning up dead shim" Dec 13 14:24:52.127427 env[1231]: time="2024-12-13T14:24:52.127345116Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:24:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2011 runtime=io.containerd.runc.v2\n" Dec 13 14:24:52.302890 kubelet[1556]: E1213 14:24:52.302817 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:52.515603 systemd[1]: Created slice kubepods-besteffort-pod409c84be_1dd3_45f0_acf6_5a3813da3839.slice. Dec 13 14:24:52.518755 env[1231]: time="2024-12-13T14:24:52.518703168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh82,Uid:409c84be-1dd3-45f0-acf6-5a3813da3839,Namespace:calico-system,Attempt:0,}" Dec 13 14:24:52.551675 env[1231]: time="2024-12-13T14:24:52.551621188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:24:52.614491 env[1231]: time="2024-12-13T14:24:52.614401012Z" level=error msg="Failed to destroy network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:52.615281 env[1231]: time="2024-12-13T14:24:52.615224511Z" level=error msg="encountered an error cleaning up failed sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:52.615563 env[1231]: time="2024-12-13T14:24:52.615501684Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh82,Uid:409c84be-1dd3-45f0-acf6-5a3813da3839,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:52.616633 kubelet[1556]: E1213 14:24:52.616031 1556 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:52.616633 kubelet[1556]: E1213 14:24:52.616143 1556 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:52.616633 kubelet[1556]: E1213 14:24:52.616207 1556 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-drh82" Dec 13 14:24:52.616901 kubelet[1556]: E1213 14:24:52.616296 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-drh82_calico-system(409c84be-1dd3-45f0-acf6-5a3813da3839)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-drh82_calico-system(409c84be-1dd3-45f0-acf6-5a3813da3839)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:52.617635 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326-shm.mount: Deactivated successfully. Dec 13 14:24:53.303354 kubelet[1556]: E1213 14:24:53.303267 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:53.394580 systemd[1]: Created slice kubepods-besteffort-pod9e646497_7e35_49f4_bcc5_a3b321cc82fd.slice. Dec 13 14:24:53.531860 kubelet[1556]: I1213 14:24:53.531721 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cm878\" (UniqueName: \"kubernetes.io/projected/9e646497-7e35-49f4-bcc5-a3b321cc82fd-kube-api-access-cm878\") pod \"nginx-deployment-8587fbcb89-jzxrx\" (UID: \"9e646497-7e35-49f4-bcc5-a3b321cc82fd\") " pod="default/nginx-deployment-8587fbcb89-jzxrx" Dec 13 14:24:53.553856 kubelet[1556]: I1213 14:24:53.553705 1556 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:24:53.555844 env[1231]: time="2024-12-13T14:24:53.555780456Z" level=info msg="StopPodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\"" Dec 13 14:24:53.662888 env[1231]: time="2024-12-13T14:24:53.662806994Z" level=error msg="StopPodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" failed" error="failed to destroy network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:53.663456 kubelet[1556]: E1213 14:24:53.663397 1556 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:24:53.663781 kubelet[1556]: E1213 14:24:53.663665 1556 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326"} Dec 13 14:24:53.663971 kubelet[1556]: E1213 14:24:53.663939 1556 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"409c84be-1dd3-45f0-acf6-5a3813da3839\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:53.664179 kubelet[1556]: E1213 14:24:53.664149 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"409c84be-1dd3-45f0-acf6-5a3813da3839\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-drh82" podUID="409c84be-1dd3-45f0-acf6-5a3813da3839" Dec 13 14:24:53.703548 env[1231]: time="2024-12-13T14:24:53.703491079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jzxrx,Uid:9e646497-7e35-49f4-bcc5-a3b321cc82fd,Namespace:default,Attempt:0,}" Dec 13 14:24:53.880901 env[1231]: time="2024-12-13T14:24:53.879429837Z" level=error msg="Failed to destroy network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:53.880901 env[1231]: time="2024-12-13T14:24:53.880663462Z" level=error msg="encountered an error cleaning up failed sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:53.880901 env[1231]: time="2024-12-13T14:24:53.880746272Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jzxrx,Uid:9e646497-7e35-49f4-bcc5-a3b321cc82fd,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:53.882955 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d-shm.mount: Deactivated successfully. Dec 13 14:24:53.887742 kubelet[1556]: E1213 14:24:53.887690 1556 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:53.887907 kubelet[1556]: E1213 14:24:53.887801 1556 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-jzxrx" Dec 13 14:24:53.887907 kubelet[1556]: E1213 14:24:53.887854 1556 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-jzxrx" Dec 13 14:24:53.888319 kubelet[1556]: E1213 14:24:53.888254 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-jzxrx_default(9e646497-7e35-49f4-bcc5-a3b321cc82fd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-jzxrx_default(9e646497-7e35-49f4-bcc5-a3b321cc82fd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-jzxrx" podUID="9e646497-7e35-49f4-bcc5-a3b321cc82fd" Dec 13 14:24:54.304399 kubelet[1556]: E1213 14:24:54.304345 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:54.557479 kubelet[1556]: I1213 14:24:54.557326 1556 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:24:54.558666 env[1231]: time="2024-12-13T14:24:54.558597440Z" level=info msg="StopPodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\"" Dec 13 14:24:54.593024 env[1231]: time="2024-12-13T14:24:54.592934085Z" level=error msg="StopPodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" failed" error="failed to destroy network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:54.593323 kubelet[1556]: E1213 14:24:54.593270 1556 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:24:54.593455 kubelet[1556]: E1213 14:24:54.593350 1556 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d"} Dec 13 14:24:54.593455 kubelet[1556]: E1213 14:24:54.593404 1556 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e646497-7e35-49f4-bcc5-a3b321cc82fd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:54.593641 kubelet[1556]: E1213 14:24:54.593442 1556 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e646497-7e35-49f4-bcc5-a3b321cc82fd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-jzxrx" podUID="9e646497-7e35-49f4-bcc5-a3b321cc82fd" Dec 13 14:24:55.221997 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:24:55.222219 kernel: audit: type=1131 audit(1734099895.190:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:55.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:55.191526 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:24:55.238000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:24:55.254496 kernel: audit: type=1334 audit(1734099895.238:546): prog-id=45 op=UNLOAD Dec 13 14:24:55.254673 kernel: audit: type=1334 audit(1734099895.238:547): prog-id=44 op=UNLOAD Dec 13 14:24:55.238000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:24:55.262243 kernel: audit: type=1334 audit(1734099895.238:548): prog-id=43 op=UNLOAD Dec 13 14:24:55.238000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:24:55.304709 kubelet[1556]: E1213 14:24:55.304624 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:56.305742 kubelet[1556]: E1213 14:24:56.305642 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:57.306692 kubelet[1556]: E1213 14:24:57.306595 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:58.307648 kubelet[1556]: E1213 14:24:58.307596 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:59.308226 kubelet[1556]: E1213 14:24:59.308135 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:24:59.525877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2331685076.mount: Deactivated successfully. Dec 13 14:24:59.575595 env[1231]: time="2024-12-13T14:24:59.575436222Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:59.578527 env[1231]: time="2024-12-13T14:24:59.578452975Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:59.581286 env[1231]: time="2024-12-13T14:24:59.581241273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:59.584368 env[1231]: time="2024-12-13T14:24:59.584321859Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:59.585035 env[1231]: time="2024-12-13T14:24:59.584980452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:24:59.607363 env[1231]: time="2024-12-13T14:24:59.607309842Z" level=info msg="CreateContainer within sandbox \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:24:59.630154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3111974819.mount: Deactivated successfully. Dec 13 14:24:59.639568 env[1231]: time="2024-12-13T14:24:59.639469239Z" level=info msg="CreateContainer within sandbox \"59eed936e814ed73a2d70b84b7d1b54637195c085a619896b26524e50f64d8eb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4032b5f1aafbf993b10f3b11d5e71f43938a364e1106417da1e65de6c960432f\"" Dec 13 14:24:59.640373 env[1231]: time="2024-12-13T14:24:59.640323500Z" level=info msg="StartContainer for \"4032b5f1aafbf993b10f3b11d5e71f43938a364e1106417da1e65de6c960432f\"" Dec 13 14:24:59.666654 systemd[1]: Started cri-containerd-4032b5f1aafbf993b10f3b11d5e71f43938a364e1106417da1e65de6c960432f.scope. Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff2fc232cc8 items=0 ppid=1650 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.749375 kernel: audit: type=1400 audit(1734099899.695:549): avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.749966 kernel: audit: type=1300 audit(1734099899.695:549): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff2fc232cc8 items=0 ppid=1650 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.750024 kernel: audit: type=1327 audit(1734099899.695:549): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333262356631616166626639393362313066336231316435653731 Dec 13 14:24:59.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333262356631616166626639393362313066336231316435653731 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.822604 kernel: audit: type=1400 audit(1734099899.695:550): avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.822787 kernel: audit: type=1400 audit(1734099899.695:550): avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.822828 kernel: audit: type=1400 audit(1734099899.695:550): avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.695000 audit: BPF prog-id=78 op=LOAD Dec 13 14:24:59.695000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000304da8 items=0 ppid=1650 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333262356631616166626639393362313066336231316435653731 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit: BPF prog-id=79 op=LOAD Dec 13 14:24:59.716000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000304df8 items=0 ppid=1650 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333262356631616166626639393362313066336231316435653731 Dec 13 14:24:59.716000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:24:59.716000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:59.716000 audit: BPF prog-id=80 op=LOAD Dec 13 14:24:59.716000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000304e88 items=0 ppid=1650 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333262356631616166626639393362313066336231316435653731 Dec 13 14:24:59.845063 env[1231]: time="2024-12-13T14:24:59.845007315Z" level=info msg="StartContainer for \"4032b5f1aafbf993b10f3b11d5e71f43938a364e1106417da1e65de6c960432f\" returns successfully" Dec 13 14:24:59.957706 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:24:59.957902 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:25:00.287893 kubelet[1556]: E1213 14:25:00.287820 1556 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:00.308697 kubelet[1556]: E1213 14:25:00.308649 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:00.598612 kubelet[1556]: I1213 14:25:00.597710 1556 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vwh6n" podStartSLOduration=3.506103735 podStartE2EDuration="20.597656141s" podCreationTimestamp="2024-12-13 14:24:40 +0000 UTC" firstStartedPulling="2024-12-13 14:24:42.495329273 +0000 UTC m=+2.858075995" lastFinishedPulling="2024-12-13 14:24:59.586881675 +0000 UTC m=+19.949628401" observedRunningTime="2024-12-13 14:25:00.597102529 +0000 UTC m=+20.959849273" watchObservedRunningTime="2024-12-13 14:25:00.597656141 +0000 UTC m=+20.960402888" Dec 13 14:25:01.331322 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 14:25:01.331495 kernel: audit: type=1400 audit(1734099901.303:555): avc: denied { write } for pid=2255 comm="tee" name="fd" dev="proc" ino=19545 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.303000 audit[2255]: AVC avc: denied { write } for pid=2255 comm="tee" name="fd" dev="proc" ino=19545 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.331687 kubelet[1556]: E1213 14:25:01.308944 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:01.303000 audit[2255]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffec3ba9f4 a2=241 a3=1b6 items=1 ppid=2228 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.364232 kernel: audit: type=1300 audit(1734099901.303:555): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffec3ba9f4 a2=241 a3=1b6 items=1 ppid=2228 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.303000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:25:01.303000 audit: PATH item=0 name="/dev/fd/63" inode=19538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.403519 kernel: audit: type=1307 audit(1734099901.303:555): cwd="/etc/service/enabled/bird/log" Dec 13 14:25:01.403704 kernel: audit: type=1302 audit(1734099901.303:555): item=0 name="/dev/fd/63" inode=19538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.426257 kernel: audit: type=1327 audit(1734099901.303:555): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.426419 kernel: audit: type=1400 audit(1734099901.317:556): avc: denied { write } for pid=2267 comm="tee" name="fd" dev="proc" ino=19555 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.317000 audit[2267]: AVC avc: denied { write } for pid=2267 comm="tee" name="fd" dev="proc" ino=19555 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.317000 audit[2267]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5a4639f3 a2=241 a3=1b6 items=1 ppid=2232 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.479988 kernel: audit: type=1300 audit(1734099901.317:556): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5a4639f3 a2=241 a3=1b6 items=1 ppid=2232 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.317000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:25:01.317000 audit: PATH item=0 name="/dev/fd/63" inode=19548 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.510937 kernel: audit: type=1307 audit(1734099901.317:556): cwd="/etc/service/enabled/confd/log" Dec 13 14:25:01.511136 kernel: audit: type=1302 audit(1734099901.317:556): item=0 name="/dev/fd/63" inode=19548 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.511209 kernel: audit: type=1327 audit(1734099901.317:556): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.317000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.328000 audit[2276]: AVC avc: denied { write } for pid=2276 comm="tee" name="fd" dev="proc" ino=19561 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.328000 audit[2276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdec5649e3 a2=241 a3=1b6 items=1 ppid=2236 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.328000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:25:01.328000 audit: PATH item=0 name="/dev/fd/63" inode=19552 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.366000 audit[2257]: AVC avc: denied { write } for pid=2257 comm="tee" name="fd" dev="proc" ino=20548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.403000 audit[2262]: AVC avc: denied { write } for pid=2262 comm="tee" name="fd" dev="proc" ino=20554 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.403000 audit[2262]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd01ccb9f3 a2=241 a3=1b6 items=1 ppid=2227 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.403000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:25:01.403000 audit: PATH item=0 name="/dev/fd/63" inode=19547 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.403000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.366000 audit[2257]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4ce0a9f3 a2=241 a3=1b6 items=1 ppid=2225 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.366000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:25:01.366000 audit: PATH item=0 name="/dev/fd/63" inode=20543 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.405000 audit[2283]: AVC avc: denied { write } for pid=2283 comm="tee" name="fd" dev="proc" ino=20559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.405000 audit[2283]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe78a29f5 a2=241 a3=1b6 items=1 ppid=2234 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.405000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:25:01.405000 audit: PATH item=0 name="/dev/fd/63" inode=19567 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.405000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.439000 audit[2299]: AVC avc: denied { write } for pid=2299 comm="tee" name="fd" dev="proc" ino=19575 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:25:01.439000 audit[2299]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd0d439e4 a2=241 a3=1b6 items=1 ppid=2238 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.439000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:25:01.439000 audit: PATH item=0 name="/dev/fd/63" inode=20556 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:01.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.784000 audit: BPF prog-id=81 op=LOAD Dec 13 14:25:01.784000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8afb5ec0 a2=98 a3=3 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.785000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit: BPF prog-id=82 op=LOAD Dec 13 14:25:01.785000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff8afb5ca0 a2=74 a3=540051 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.785000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.785000 audit: BPF prog-id=83 op=LOAD Dec 13 14:25:01.785000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff8afb5cd0 a2=94 a3=2 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.785000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.904000 audit: BPF prog-id=84 op=LOAD Dec 13 14:25:01.904000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff8afb5b90 a2=40 a3=1 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.904000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.905000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:25:01.905000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.905000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff8afb5c60 a2=50 a3=7fff8afb5d40 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.905000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8afb5ba0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8afb5bd0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8afb5ae0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8afb5bf0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8afb5bd0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8afb5bc0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8afb5bf0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8afb5bd0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8afb5bf0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8afb5bc0 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8afb5c30 a2=28 a3=0 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff8afb59e0 a2=50 a3=1 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit: BPF prog-id=85 op=LOAD Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8afb59e0 a2=94 a3=5 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff8afb5a90 a2=50 a3=1 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff8afb5bb0 a2=4 a3=38 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.917000 audit[2357]: AVC avc: denied { confidentiality } for pid=2357 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:01.917000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff8afb5c00 a2=94 a3=6 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { confidentiality } for pid=2357 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:01.918000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff8afb53b0 a2=94 a3=83 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.918000 audit[2357]: AVC avc: denied { confidentiality } for pid=2357 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:01.918000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff8afb53b0 a2=94 a3=83 items=0 ppid=2226 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.931000 audit: BPF prog-id=86 op=LOAD Dec 13 14:25:01.931000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff88b28c60 a2=98 a3=1999999999999999 items=0 ppid=2226 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.931000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:25:01.932000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit: BPF prog-id=87 op=LOAD Dec 13 14:25:01.932000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff88b28b40 a2=74 a3=ffff items=0 ppid=2226 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.932000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:25:01.932000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:01.932000 audit: BPF prog-id=88 op=LOAD Dec 13 14:25:01.932000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff88b28b80 a2=40 a3=7fff88b28d60 items=0 ppid=2226 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:01.932000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:25:01.932000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:25:02.019472 systemd-networkd[1029]: vxlan.calico: Link UP Dec 13 14:25:02.019484 systemd-networkd[1029]: vxlan.calico: Gained carrier Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.058000 audit: BPF prog-id=89 op=LOAD Dec 13 14:25:02.058000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd65720c0 a2=98 a3=ffffffff items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.058000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit: BPF prog-id=90 op=LOAD Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd6571ed0 a2=74 a3=540051 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit: BPF prog-id=91 op=LOAD Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd6571f00 a2=94 a3=2 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd6571dd0 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6571e00 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6571d10 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd6571e20 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd6571e00 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd6571df0 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd6571e20 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6571e00 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6571e20 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6571df0 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.059000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.059000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd6571e60 a2=28 a3=0 items=0 ppid=2226 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit: BPF prog-id=95 op=LOAD Dec 13 14:25:02.066000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd720063f0 a2=98 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.066000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.066000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.066000 audit: BPF prog-id=96 op=LOAD Dec 13 14:25:02.066000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd720061d0 a2=74 a3=540051 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.066000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.067000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.067000 audit: BPF prog-id=97 op=LOAD Dec 13 14:25:02.067000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd72006200 a2=94 a3=2 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.067000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.067000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit: BPF prog-id=98 op=LOAD Dec 13 14:25:02.210000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd720060c0 a2=40 a3=1 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.210000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:25:02.210000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.210000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd72006190 a2=50 a3=7ffd72006270 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd720060d0 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd72006100 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd72006010 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd72006120 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd72006100 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd720060f0 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd72006120 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.222000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.222000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd72006100 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd72006120 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd720060f0 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd72006160 a2=28 a3=0 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd72005f10 a2=50 a3=1 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit: BPF prog-id=99 op=LOAD Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd72005f10 a2=94 a3=5 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd72005fc0 a2=50 a3=1 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd720060e0 a2=4 a3=38 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.223000 audit[2394]: AVC avc: denied { confidentiality } for pid=2394 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:02.223000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd72006130 a2=94 a3=6 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { confidentiality } for pid=2394 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:02.224000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd720058e0 a2=94 a3=83 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd720058e0 a2=94 a3=83 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.224000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.224000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd72007320 a2=10 a3=f1f00800 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.224000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.225000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.225000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd720071c0 a2=10 a3=3 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.225000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.225000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd72007160 a2=10 a3=3 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.225000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:02.225000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd72007160 a2=10 a3=7 items=0 ppid=2226 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:25:02.233000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:25:02.309615 kubelet[1556]: E1213 14:25:02.309561 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:02.312000 audit[2418]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:02.312000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd08830280 a2=0 a3=7ffd0883026c items=0 ppid=2226 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.312000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:02.327000 audit[2419]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:02.327000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc8823d030 a2=0 a3=7ffc8823d01c items=0 ppid=2226 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:02.347000 audit[2422]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:02.347000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff4daccdd0 a2=0 a3=7fff4daccdbc items=0 ppid=2226 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.347000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:02.349000 audit[2417]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:02.349000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffec39647e0 a2=0 a3=7ffec39647cc items=0 ppid=2226 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:02.349000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:03.310558 kubelet[1556]: E1213 14:25:03.310487 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:03.510510 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Dec 13 14:25:04.311089 kubelet[1556]: E1213 14:25:04.311017 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:05.311575 kubelet[1556]: E1213 14:25:05.311500 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:06.312515 kubelet[1556]: E1213 14:25:06.312438 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:07.313640 kubelet[1556]: E1213 14:25:07.313567 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:07.510004 env[1231]: time="2024-12-13T14:25:07.509923716Z" level=info msg="StopPodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\"" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.564 [INFO][2450] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.564 [INFO][2450] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" iface="eth0" netns="/var/run/netns/cni-66699d5f-f558-2e47-2e57-6481a4db2c79" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.564 [INFO][2450] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" iface="eth0" netns="/var/run/netns/cni-66699d5f-f558-2e47-2e57-6481a4db2c79" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.565 [INFO][2450] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" iface="eth0" netns="/var/run/netns/cni-66699d5f-f558-2e47-2e57-6481a4db2c79" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.565 [INFO][2450] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.565 [INFO][2450] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.594 [INFO][2457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.595 [INFO][2457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.595 [INFO][2457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.603 [WARNING][2457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.603 [INFO][2457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.607 [INFO][2457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:07.614471 env[1231]: 2024-12-13 14:25:07.609 [INFO][2450] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:07.614160 systemd[1]: run-netns-cni\x2d66699d5f\x2df558\x2d2e47\x2d2e57\x2d6481a4db2c79.mount: Deactivated successfully. Dec 13 14:25:07.615856 env[1231]: time="2024-12-13T14:25:07.615800346Z" level=info msg="TearDown network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" successfully" Dec 13 14:25:07.616029 env[1231]: time="2024-12-13T14:25:07.615992064Z" level=info msg="StopPodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" returns successfully" Dec 13 14:25:07.617235 env[1231]: time="2024-12-13T14:25:07.617167812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jzxrx,Uid:9e646497-7e35-49f4-bcc5-a3b321cc82fd,Namespace:default,Attempt:1,}" Dec 13 14:25:07.784928 systemd-networkd[1029]: calie168eec211e: Link UP Dec 13 14:25:07.793222 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:25:07.802220 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie168eec211e: link becomes ready Dec 13 14:25:07.802096 systemd-networkd[1029]: calie168eec211e: Gained carrier Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.695 [INFO][2465] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0 nginx-deployment-8587fbcb89- default 9e646497-7e35-49f4-bcc5-a3b321cc82fd 1076 0 2024-12-13 14:24:53 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.71 nginx-deployment-8587fbcb89-jzxrx eth0 default [] [] [kns.default ksa.default.default] calie168eec211e [] []}} ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.695 [INFO][2465] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.732 [INFO][2476] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" HandleID="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.745 [INFO][2476] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" HandleID="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a4fd0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.71", "pod":"nginx-deployment-8587fbcb89-jzxrx", "timestamp":"2024-12-13 14:25:07.732517583 +0000 UTC"}, Hostname:"10.128.0.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.745 [INFO][2476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.746 [INFO][2476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.746 [INFO][2476] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.71' Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.748 [INFO][2476] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.753 [INFO][2476] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.759 [INFO][2476] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.761 [INFO][2476] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.764 [INFO][2476] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.764 [INFO][2476] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.766 [INFO][2476] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3 Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.771 [INFO][2476] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.778 [INFO][2476] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.65/26] block=192.168.127.64/26 handle="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.778 [INFO][2476] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.65/26] handle="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" host="10.128.0.71" Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.778 [INFO][2476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:07.825557 env[1231]: 2024-12-13 14:25:07.778 [INFO][2476] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.65/26] IPv6=[] ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" HandleID="k8s-pod-network.dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.827032 env[1231]: 2024-12-13 14:25:07.780 [INFO][2465] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"9e646497-7e35-49f4-bcc5-a3b321cc82fd", ResourceVersion:"1076", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-jzxrx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie168eec211e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:07.827032 env[1231]: 2024-12-13 14:25:07.780 [INFO][2465] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.65/32] ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.827032 env[1231]: 2024-12-13 14:25:07.780 [INFO][2465] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie168eec211e ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.827032 env[1231]: 2024-12-13 14:25:07.803 [INFO][2465] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.827032 env[1231]: 2024-12-13 14:25:07.803 [INFO][2465] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"9e646497-7e35-49f4-bcc5-a3b321cc82fd", ResourceVersion:"1076", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3", Pod:"nginx-deployment-8587fbcb89-jzxrx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie168eec211e", MAC:"be:23:fe:57:f4:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:07.827032 env[1231]: 2024-12-13 14:25:07.818 [INFO][2465] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3" Namespace="default" Pod="nginx-deployment-8587fbcb89-jzxrx" WorkloadEndpoint="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:07.852290 kernel: kauditd_printk_skb: 573 callbacks suppressed Dec 13 14:25:07.852557 kernel: audit: type=1325 audit(1734099907.841:650): table=filter:71 family=2 entries=34 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:07.841000 audit[2493]: NETFILTER_CFG table=filter:71 family=2 entries=34 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:07.864304 env[1231]: time="2024-12-13T14:25:07.851168982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:07.864304 env[1231]: time="2024-12-13T14:25:07.851237399Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:07.864304 env[1231]: time="2024-12-13T14:25:07.851256257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:07.864304 env[1231]: time="2024-12-13T14:25:07.851430402Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3 pid=2504 runtime=io.containerd.runc.v2 Dec 13 14:25:07.841000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffdfc83d050 a2=0 a3=7ffdfc83d03c items=0 ppid=2226 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:07.898241 kernel: audit: type=1300 audit(1734099907.841:650): arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffdfc83d050 a2=0 a3=7ffdfc83d03c items=0 ppid=2226 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:07.841000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:07.926298 kernel: audit: type=1327 audit(1734099907.841:650): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:07.925923 systemd[1]: Started cri-containerd-dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3.scope. Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.983512 kernel: audit: type=1400 audit(1734099907.942:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.983678 kernel: audit: type=1400 audit(1734099907.942:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.983723 kernel: audit: type=1400 audit(1734099907.942:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.025239 kernel: audit: type=1400 audit(1734099907.942:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.025410 kernel: audit: type=1400 audit(1734099907.942:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.067603 kernel: audit: type=1400 audit(1734099907.942:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.088993 kernel: audit: type=1400 audit(1734099907.942:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:07.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.004000 audit: BPF prog-id=100 op=LOAD Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2504 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383439343133383861666163363866313431653538353361333439 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2504 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383439343133383861666163363866313431653538353361333439 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.005000 audit: BPF prog-id=101 op=LOAD Dec 13 14:25:08.005000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca010 items=0 ppid=2504 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383439343133383861666163363866313431653538353361333439 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.046000 audit: BPF prog-id=102 op=LOAD Dec 13 14:25:08.046000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca058 items=0 ppid=2504 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383439343133383861666163363866313431653538353361333439 Dec 13 14:25:08.067000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:25:08.068000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.068000 audit: BPF prog-id=103 op=LOAD Dec 13 14:25:08.068000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ca468 items=0 ppid=2504 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383439343133383861666163363866313431653538353361333439 Dec 13 14:25:08.134215 env[1231]: time="2024-12-13T14:25:08.134116977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-jzxrx,Uid:9e646497-7e35-49f4-bcc5-a3b321cc82fd,Namespace:default,Attempt:1,} returns sandbox id \"dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3\"" Dec 13 14:25:08.136732 env[1231]: time="2024-12-13T14:25:08.136691138Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:25:08.314714 kubelet[1556]: E1213 14:25:08.314513 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:08.510823 env[1231]: time="2024-12-13T14:25:08.510761593Z" level=info msg="StopPodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\"" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.563 [INFO][2554] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.563 [INFO][2554] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" iface="eth0" netns="/var/run/netns/cni-2af8f50b-c216-f262-e19f-ec9b3802b177" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.564 [INFO][2554] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" iface="eth0" netns="/var/run/netns/cni-2af8f50b-c216-f262-e19f-ec9b3802b177" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.564 [INFO][2554] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" iface="eth0" netns="/var/run/netns/cni-2af8f50b-c216-f262-e19f-ec9b3802b177" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.564 [INFO][2554] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.564 [INFO][2554] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.592 [INFO][2560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.592 [INFO][2560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.592 [INFO][2560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.599 [WARNING][2560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.600 [INFO][2560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.602 [INFO][2560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:08.605719 env[1231]: 2024-12-13 14:25:08.604 [INFO][2554] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:08.608616 systemd[1]: run-netns-cni\x2d2af8f50b\x2dc216\x2df262\x2de19f\x2dec9b3802b177.mount: Deactivated successfully. Dec 13 14:25:08.610304 env[1231]: time="2024-12-13T14:25:08.610246461Z" level=info msg="TearDown network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" successfully" Dec 13 14:25:08.610304 env[1231]: time="2024-12-13T14:25:08.610301209Z" level=info msg="StopPodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" returns successfully" Dec 13 14:25:08.614318 env[1231]: time="2024-12-13T14:25:08.611406564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh82,Uid:409c84be-1dd3-45f0-acf6-5a3813da3839,Namespace:calico-system,Attempt:1,}" Dec 13 14:25:08.778642 systemd-networkd[1029]: calid49f48da506: Link UP Dec 13 14:25:08.789034 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid49f48da506: link becomes ready Dec 13 14:25:08.790266 systemd-networkd[1029]: calid49f48da506: Gained carrier Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.682 [INFO][2567] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.71-k8s-csi--node--driver--drh82-eth0 csi-node-driver- calico-system 409c84be-1dd3-45f0-acf6-5a3813da3839 1083 0 2024-12-13 14:24:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.71 csi-node-driver-drh82 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid49f48da506 [] []}} ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.682 [INFO][2567] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.719 [INFO][2579] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" HandleID="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.735 [INFO][2579] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" HandleID="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318e90), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.71", "pod":"csi-node-driver-drh82", "timestamp":"2024-12-13 14:25:08.719703092 +0000 UTC"}, Hostname:"10.128.0.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.735 [INFO][2579] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.735 [INFO][2579] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.735 [INFO][2579] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.71' Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.738 [INFO][2579] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.742 [INFO][2579] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.747 [INFO][2579] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.749 [INFO][2579] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.752 [INFO][2579] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.752 [INFO][2579] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.754 [INFO][2579] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623 Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.760 [INFO][2579] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.769 [INFO][2579] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.66/26] block=192.168.127.64/26 handle="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.769 [INFO][2579] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.66/26] handle="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" host="10.128.0.71" Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.769 [INFO][2579] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:08.810718 env[1231]: 2024-12-13 14:25:08.769 [INFO][2579] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.66/26] IPv6=[] ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" HandleID="k8s-pod-network.4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.811934 env[1231]: 2024-12-13 14:25:08.771 [INFO][2567] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-csi--node--driver--drh82-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"409c84be-1dd3-45f0-acf6-5a3813da3839", ResourceVersion:"1083", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"", Pod:"csi-node-driver-drh82", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid49f48da506", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:08.811934 env[1231]: 2024-12-13 14:25:08.771 [INFO][2567] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.66/32] ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.811934 env[1231]: 2024-12-13 14:25:08.771 [INFO][2567] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid49f48da506 ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.811934 env[1231]: 2024-12-13 14:25:08.789 [INFO][2567] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.811934 env[1231]: 2024-12-13 14:25:08.791 [INFO][2567] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-csi--node--driver--drh82-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"409c84be-1dd3-45f0-acf6-5a3813da3839", ResourceVersion:"1083", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623", Pod:"csi-node-driver-drh82", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid49f48da506", MAC:"26:b0:69:12:e8:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:08.811934 env[1231]: 2024-12-13 14:25:08.802 [INFO][2567] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623" Namespace="calico-system" Pod="csi-node-driver-drh82" WorkloadEndpoint="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:08.826000 audit[2600]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:08.826000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd34ea9d50 a2=0 a3=7ffd34ea9d3c items=0 ppid=2226 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.826000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:08.830871 env[1231]: time="2024-12-13T14:25:08.830784745Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:08.831048 env[1231]: time="2024-12-13T14:25:08.830841456Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:08.831048 env[1231]: time="2024-12-13T14:25:08.830859691Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:08.831347 env[1231]: time="2024-12-13T14:25:08.831286329Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623 pid=2608 runtime=io.containerd.runc.v2 Dec 13 14:25:08.860149 systemd[1]: run-containerd-runc-k8s.io-4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623-runc.P5lXPS.mount: Deactivated successfully. Dec 13 14:25:08.871770 systemd[1]: Started cri-containerd-4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623.scope. Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.887000 audit: BPF prog-id=104 op=LOAD Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2608 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353265346466336438646363643437323531383866613435393436 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2608 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353265346466336438646363643437323531383866613435393436 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit: BPF prog-id=105 op=LOAD Dec 13 14:25:08.889000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e7e50 items=0 ppid=2608 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353265346466336438646363643437323531383866613435393436 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit: BPF prog-id=106 op=LOAD Dec 13 14:25:08.889000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e7e98 items=0 ppid=2608 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353265346466336438646363643437323531383866613435393436 Dec 13 14:25:08.889000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:25:08.889000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:08.889000 audit: BPF prog-id=107 op=LOAD Dec 13 14:25:08.889000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cc2a8 items=0 ppid=2608 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:08.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353265346466336438646363643437323531383866613435393436 Dec 13 14:25:08.913109 env[1231]: time="2024-12-13T14:25:08.913049873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh82,Uid:409c84be-1dd3-45f0-acf6-5a3813da3839,Namespace:calico-system,Attempt:1,} returns sandbox id \"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623\"" Dec 13 14:25:09.315512 kubelet[1556]: E1213 14:25:09.315455 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:09.335039 systemd-networkd[1029]: calie168eec211e: Gained IPv6LL Dec 13 14:25:09.758316 update_engine[1219]: I1213 14:25:09.758262 1219 update_attempter.cc:509] Updating boot flags... Dec 13 14:25:10.316704 kubelet[1556]: E1213 14:25:10.316600 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:10.487697 systemd-networkd[1029]: calid49f48da506: Gained IPv6LL Dec 13 14:25:11.155222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2241642262.mount: Deactivated successfully. Dec 13 14:25:11.317586 kubelet[1556]: E1213 14:25:11.317533 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:12.327698 kubelet[1556]: E1213 14:25:12.327628 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:12.928484 env[1231]: time="2024-12-13T14:25:12.928413947Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:12.931221 env[1231]: time="2024-12-13T14:25:12.931139610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:12.933814 env[1231]: time="2024-12-13T14:25:12.933770084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:12.936944 env[1231]: time="2024-12-13T14:25:12.936901807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:12.937583 env[1231]: time="2024-12-13T14:25:12.937526258Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:25:12.940280 env[1231]: time="2024-12-13T14:25:12.939843763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:25:12.941399 env[1231]: time="2024-12-13T14:25:12.941354099Z" level=info msg="CreateContainer within sandbox \"dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:25:12.959771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2398090496.mount: Deactivated successfully. Dec 13 14:25:12.969601 env[1231]: time="2024-12-13T14:25:12.969542544Z" level=info msg="CreateContainer within sandbox \"dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"617a15655af44e22b73abd241892a96850d0d5f98928d115baa5ca36947705c6\"" Dec 13 14:25:12.970587 env[1231]: time="2024-12-13T14:25:12.970474169Z" level=info msg="StartContainer for \"617a15655af44e22b73abd241892a96850d0d5f98928d115baa5ca36947705c6\"" Dec 13 14:25:13.006107 systemd[1]: Started cri-containerd-617a15655af44e22b73abd241892a96850d0d5f98928d115baa5ca36947705c6.scope. Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.030466 kernel: kauditd_printk_skb: 110 callbacks suppressed Dec 13 14:25:13.030591 kernel: audit: type=1400 audit(1734099913.023:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.073245 kernel: audit: type=1400 audit(1734099913.023:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.073403 kernel: audit: type=1400 audit(1734099913.023:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.117080 kernel: audit: type=1400 audit(1734099913.023:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.117254 kernel: audit: type=1400 audit(1734099913.023:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.137330 kernel: audit: type=1400 audit(1734099913.023:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.139019 env[1231]: time="2024-12-13T14:25:13.138962314Z" level=info msg="StartContainer for \"617a15655af44e22b73abd241892a96850d0d5f98928d115baa5ca36947705c6\" returns successfully" Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.199576 kernel: audit: type=1400 audit(1734099913.023:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.199743 kernel: audit: type=1400 audit(1734099913.023:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.220403 kernel: audit: type=1400 audit(1734099913.023:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.241220 kernel: audit: type=1400 audit(1734099913.023:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.023000 audit: BPF prog-id=108 op=LOAD Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2504 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631376131353635356166343465323262373361626432343138393261 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2504 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631376131353635356166343465323262373361626432343138393261 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.028000 audit: BPF prog-id=109 op=LOAD Dec 13 14:25:13.028000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000335300 items=0 ppid=2504 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631376131353635356166343465323262373361626432343138393261 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit: BPF prog-id=110 op=LOAD Dec 13 14:25:13.050000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000335348 items=0 ppid=2504 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631376131353635356166343465323262373361626432343138393261 Dec 13 14:25:13.050000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:25:13.050000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.050000 audit: BPF prog-id=111 op=LOAD Dec 13 14:25:13.050000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000335758 items=0 ppid=2504 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631376131353635356166343465323262373361626432343138393261 Dec 13 14:25:13.328779 kubelet[1556]: E1213 14:25:13.328709 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:13.709997 kubelet[1556]: I1213 14:25:13.709876 1556 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-jzxrx" podStartSLOduration=15.906591403 podStartE2EDuration="20.709858033s" podCreationTimestamp="2024-12-13 14:24:53 +0000 UTC" firstStartedPulling="2024-12-13 14:25:08.136298724 +0000 UTC m=+28.499045442" lastFinishedPulling="2024-12-13 14:25:12.939565349 +0000 UTC m=+33.302312072" observedRunningTime="2024-12-13 14:25:13.709706809 +0000 UTC m=+34.072453552" watchObservedRunningTime="2024-12-13 14:25:13.709858033 +0000 UTC m=+34.072604775" Dec 13 14:25:13.995348 systemd[1]: run-containerd-runc-k8s.io-4032b5f1aafbf993b10f3b11d5e71f43938a364e1106417da1e65de6c960432f-runc.lYCBwk.mount: Deactivated successfully. Dec 13 14:25:14.116893 env[1231]: time="2024-12-13T14:25:14.116823813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.120140 env[1231]: time="2024-12-13T14:25:14.120082386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.122804 env[1231]: time="2024-12-13T14:25:14.122730250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.125543 env[1231]: time="2024-12-13T14:25:14.125492608Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.126349 env[1231]: time="2024-12-13T14:25:14.126304403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:25:14.129740 env[1231]: time="2024-12-13T14:25:14.129695222Z" level=info msg="CreateContainer within sandbox \"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:25:14.151840 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1999228770.mount: Deactivated successfully. Dec 13 14:25:14.160978 env[1231]: time="2024-12-13T14:25:14.160903264Z" level=info msg="CreateContainer within sandbox \"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0a13b031a1ddc03a8b59eedf6e7ad35a65bade33bad176684efb384c41ec823b\"" Dec 13 14:25:14.162057 env[1231]: time="2024-12-13T14:25:14.162014797Z" level=info msg="StartContainer for \"0a13b031a1ddc03a8b59eedf6e7ad35a65bade33bad176684efb384c41ec823b\"" Dec 13 14:25:14.187871 systemd[1]: Started cri-containerd-0a13b031a1ddc03a8b59eedf6e7ad35a65bade33bad176684efb384c41ec823b.scope. Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fb7aab6f2f8 items=0 ppid=2608 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:14.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313362303331613164646330336138623539656564663665376164 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit: BPF prog-id=112 op=LOAD Dec 13 14:25:14.211000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0000243a8 items=0 ppid=2608 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:14.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313362303331613164646330336138623539656564663665376164 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.211000 audit: BPF prog-id=113 op=LOAD Dec 13 14:25:14.211000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0000243f8 items=0 ppid=2608 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:14.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313362303331613164646330336138623539656564663665376164 Dec 13 14:25:14.212000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:25:14.212000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:14.212000 audit: BPF prog-id=114 op=LOAD Dec 13 14:25:14.212000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000024488 items=0 ppid=2608 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:14.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313362303331613164646330336138623539656564663665376164 Dec 13 14:25:14.240833 env[1231]: time="2024-12-13T14:25:14.240750053Z" level=info msg="StartContainer for \"0a13b031a1ddc03a8b59eedf6e7ad35a65bade33bad176684efb384c41ec823b\" returns successfully" Dec 13 14:25:14.242985 env[1231]: time="2024-12-13T14:25:14.242921066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:25:14.329496 kubelet[1556]: E1213 14:25:14.329339 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:15.329916 kubelet[1556]: E1213 14:25:15.329865 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:15.642170 env[1231]: time="2024-12-13T14:25:15.642006666Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.645649 env[1231]: time="2024-12-13T14:25:15.645593988Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.648281 env[1231]: time="2024-12-13T14:25:15.648234098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.650470 env[1231]: time="2024-12-13T14:25:15.650419396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.651227 env[1231]: time="2024-12-13T14:25:15.651153870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:25:15.654625 env[1231]: time="2024-12-13T14:25:15.654579639Z" level=info msg="CreateContainer within sandbox \"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:25:15.675294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1988336935.mount: Deactivated successfully. Dec 13 14:25:15.682675 env[1231]: time="2024-12-13T14:25:15.682615328Z" level=info msg="CreateContainer within sandbox \"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"84737655df821e9d5e93aeb055b844d621263fb1dcc460fa1e594d8c69bffc66\"" Dec 13 14:25:15.683772 env[1231]: time="2024-12-13T14:25:15.683713662Z" level=info msg="StartContainer for \"84737655df821e9d5e93aeb055b844d621263fb1dcc460fa1e594d8c69bffc66\"" Dec 13 14:25:15.724013 systemd[1]: Started cri-containerd-84737655df821e9d5e93aeb055b844d621263fb1dcc460fa1e594d8c69bffc66.scope. Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8c22f4eb18 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:15.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373337363535646638323165396435653933616562303535623834 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.749000 audit: BPF prog-id=115 op=LOAD Dec 13 14:25:15.749000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002ff128 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:15.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373337363535646638323165396435653933616562303535623834 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit: BPF prog-id=116 op=LOAD Dec 13 14:25:15.750000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002ff178 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:15.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373337363535646638323165396435653933616562303535623834 Dec 13 14:25:15.750000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:25:15.750000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:15.750000 audit: BPF prog-id=117 op=LOAD Dec 13 14:25:15.750000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ff208 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:15.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373337363535646638323165396435653933616562303535623834 Dec 13 14:25:15.783092 env[1231]: time="2024-12-13T14:25:15.783030291Z" level=info msg="StartContainer for \"84737655df821e9d5e93aeb055b844d621263fb1dcc460fa1e594d8c69bffc66\" returns successfully" Dec 13 14:25:15.974862 systemd[1]: run-containerd-runc-k8s.io-84737655df821e9d5e93aeb055b844d621263fb1dcc460fa1e594d8c69bffc66-runc.4yfduy.mount: Deactivated successfully. Dec 13 14:25:16.331036 kubelet[1556]: E1213 14:25:16.330875 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:16.491662 kubelet[1556]: I1213 14:25:16.491626 1556 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:25:16.491662 kubelet[1556]: I1213 14:25:16.491670 1556 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:25:16.731960 kubelet[1556]: I1213 14:25:16.731890 1556 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-drh82" podStartSLOduration=29.994350112 podStartE2EDuration="36.731867287s" podCreationTimestamp="2024-12-13 14:24:40 +0000 UTC" firstStartedPulling="2024-12-13 14:25:08.915065626 +0000 UTC m=+29.277812360" lastFinishedPulling="2024-12-13 14:25:15.652582812 +0000 UTC m=+36.015329535" observedRunningTime="2024-12-13 14:25:16.730553548 +0000 UTC m=+37.093300294" watchObservedRunningTime="2024-12-13 14:25:16.731867287 +0000 UTC m=+37.094614031" Dec 13 14:25:17.332165 kubelet[1556]: E1213 14:25:17.332113 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:18.332579 kubelet[1556]: E1213 14:25:18.332514 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:19.333274 kubelet[1556]: E1213 14:25:19.333180 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:20.287657 kubelet[1556]: E1213 14:25:20.287576 1556 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:20.334237 kubelet[1556]: E1213 14:25:20.334171 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:20.695000 audit[2825]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.702227 kernel: kauditd_printk_skb: 133 callbacks suppressed Dec 13 14:25:20.702377 kernel: audit: type=1325 audit(1734099920.695:718): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.721252 kernel: audit: type=1300 audit(1734099920.695:718): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc8388dc20 a2=0 a3=7ffc8388dc0c items=0 ppid=1811 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.695000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc8388dc20 a2=0 a3=7ffc8388dc0c items=0 ppid=1811 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.695000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.762083 systemd[1]: Created slice kubepods-besteffort-pod376b176f_aa90_41b9_a976_3ac9cc6faf72.slice. Dec 13 14:25:20.768394 kernel: audit: type=1327 audit(1734099920.695:718): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.768530 kernel: audit: type=1325 audit(1734099920.750:719): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.750000 audit[2825]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.750000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc8388dc20 a2=0 a3=0 items=0 ppid=1811 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.816950 kernel: audit: type=1300 audit(1734099920.750:719): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc8388dc20 a2=0 a3=0 items=0 ppid=1811 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.817225 kernel: audit: type=1327 audit(1734099920.750:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.842000 audit[2829]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.842000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed59e8bb0 a2=0 a3=7ffed59e8b9c items=0 ppid=1811 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.861238 kernel: audit: type=1325 audit(1734099920.842:720): table=filter:75 family=2 entries=32 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.861309 kernel: audit: type=1300 audit(1734099920.842:720): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed59e8bb0 a2=0 a3=7ffed59e8b9c items=0 ppid=1811 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.895134 kernel: audit: type=1327 audit(1734099920.842:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.893000 audit[2829]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.926053 kernel: audit: type=1325 audit(1734099920.893:721): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.893000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed59e8bb0 a2=0 a3=0 items=0 ppid=1811 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.961690 kubelet[1556]: I1213 14:25:20.961507 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-psqx6\" (UniqueName: \"kubernetes.io/projected/376b176f-aa90-41b9-a976-3ac9cc6faf72-kube-api-access-psqx6\") pod \"nfs-server-provisioner-0\" (UID: \"376b176f-aa90-41b9-a976-3ac9cc6faf72\") " pod="default/nfs-server-provisioner-0" Dec 13 14:25:20.961690 kubelet[1556]: I1213 14:25:20.961578 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/376b176f-aa90-41b9-a976-3ac9cc6faf72-data\") pod \"nfs-server-provisioner-0\" (UID: \"376b176f-aa90-41b9-a976-3ac9cc6faf72\") " pod="default/nfs-server-provisioner-0" Dec 13 14:25:21.335719 kubelet[1556]: E1213 14:25:21.335552 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:21.368028 env[1231]: time="2024-12-13T14:25:21.367960811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:376b176f-aa90-41b9-a976-3ac9cc6faf72,Namespace:default,Attempt:0,}" Dec 13 14:25:21.553296 systemd-networkd[1029]: cali60e51b789ff: Link UP Dec 13 14:25:21.564874 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:25:21.565008 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:25:21.565409 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.443 [INFO][2831] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.71-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 376b176f-aa90-41b9-a976-3ac9cc6faf72 1153 0 2024-12-13 14:25:20 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.71 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.444 [INFO][2831] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.478 [INFO][2842] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" HandleID="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Workload="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.495 [INFO][2842] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" HandleID="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Workload="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031afd0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.71", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:25:21.478333232 +0000 UTC"}, Hostname:"10.128.0.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.495 [INFO][2842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.496 [INFO][2842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.496 [INFO][2842] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.71' Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.498 [INFO][2842] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.509 [INFO][2842] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.519 [INFO][2842] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.521 [INFO][2842] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.525 [INFO][2842] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.525 [INFO][2842] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.527 [INFO][2842] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53 Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.535 [INFO][2842] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.546 [INFO][2842] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.67/26] block=192.168.127.64/26 handle="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.546 [INFO][2842] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.67/26] handle="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" host="10.128.0.71" Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.546 [INFO][2842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:21.587667 env[1231]: 2024-12-13 14:25:21.546 [INFO][2842] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.67/26] IPv6=[] ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" HandleID="k8s-pod-network.032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Workload="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.588966 env[1231]: 2024-12-13 14:25:21.547 [INFO][2831] cni-plugin/k8s.go 386: Populated endpoint ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"376b176f-aa90-41b9-a976-3ac9cc6faf72", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:21.588966 env[1231]: 2024-12-13 14:25:21.548 [INFO][2831] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.67/32] ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.588966 env[1231]: 2024-12-13 14:25:21.548 [INFO][2831] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.588966 env[1231]: 2024-12-13 14:25:21.566 [INFO][2831] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.589352 env[1231]: 2024-12-13 14:25:21.571 [INFO][2831] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"376b176f-aa90-41b9-a976-3ac9cc6faf72", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"72:f5:72:f3:25:7a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:21.589352 env[1231]: 2024-12-13 14:25:21.585 [INFO][2831] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.71-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:25:21.620613 env[1231]: time="2024-12-13T14:25:21.620509161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:21.620613 env[1231]: time="2024-12-13T14:25:21.620567115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:21.620959 env[1231]: time="2024-12-13T14:25:21.620586270Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:21.620959 env[1231]: time="2024-12-13T14:25:21.620779721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53 pid=2869 runtime=io.containerd.runc.v2 Dec 13 14:25:21.636000 audit[2874]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:21.636000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffcb28fc380 a2=0 a3=7ffcb28fc36c items=0 ppid=2226 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:21.656840 systemd[1]: Started cri-containerd-032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53.scope. Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.671000 audit: BPF prog-id=118 op=LOAD Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2869 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033326236386266316662393631623662616537656138313766633734 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2869 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033326236386266316662393631623662616537656138313766633734 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit: BPF prog-id=119 op=LOAD Dec 13 14:25:21.672000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025650 items=0 ppid=2869 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033326236386266316662393631623662616537656138313766633734 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit: BPF prog-id=120 op=LOAD Dec 13 14:25:21.672000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025698 items=0 ppid=2869 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033326236386266316662393631623662616537656138313766633734 Dec 13 14:25:21.672000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:25:21.672000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.672000 audit: BPF prog-id=121 op=LOAD Dec 13 14:25:21.672000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025aa8 items=0 ppid=2869 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033326236386266316662393631623662616537656138313766633734 Dec 13 14:25:21.712043 env[1231]: time="2024-12-13T14:25:21.710811414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:376b176f-aa90-41b9-a976-3ac9cc6faf72,Namespace:default,Attempt:0,} returns sandbox id \"032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53\"" Dec 13 14:25:21.712927 env[1231]: time="2024-12-13T14:25:21.712855625Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:25:22.336156 kubelet[1556]: E1213 14:25:22.336078 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:23.336685 kubelet[1556]: E1213 14:25:23.336586 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:23.350850 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Dec 13 14:25:24.337842 kubelet[1556]: E1213 14:25:24.337697 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:24.569860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1957201921.mount: Deactivated successfully. Dec 13 14:25:25.338589 kubelet[1556]: E1213 14:25:25.338536 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:26.339487 kubelet[1556]: E1213 14:25:26.339433 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:27.340669 kubelet[1556]: E1213 14:25:27.340604 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:27.737354 env[1231]: time="2024-12-13T14:25:27.737296429Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:27.740581 env[1231]: time="2024-12-13T14:25:27.740536329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:27.743714 env[1231]: time="2024-12-13T14:25:27.743671571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:27.752941 env[1231]: time="2024-12-13T14:25:27.752880662Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:27.753943 env[1231]: time="2024-12-13T14:25:27.753879118Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:25:27.757742 env[1231]: time="2024-12-13T14:25:27.757691427Z" level=info msg="CreateContainer within sandbox \"032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:25:27.781866 env[1231]: time="2024-12-13T14:25:27.781793426Z" level=info msg="CreateContainer within sandbox \"032b68bf1fb961b6bae7ea817fc742eb29e7ff26f5c5c4e39b49675fab126c53\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c5333cc8ff8e499b16e6c04f2b1ad4c890f6b88169fcbf4965d80e1892b1db84\"" Dec 13 14:25:27.782827 env[1231]: time="2024-12-13T14:25:27.782770033Z" level=info msg="StartContainer for \"c5333cc8ff8e499b16e6c04f2b1ad4c890f6b88169fcbf4965d80e1892b1db84\"" Dec 13 14:25:27.809688 systemd[1]: Started cri-containerd-c5333cc8ff8e499b16e6c04f2b1ad4c890f6b88169fcbf4965d80e1892b1db84.scope. Dec 13 14:25:27.864863 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:25:27.865064 kernel: audit: type=1400 audit(1734099927.837:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.865121 kernel: audit: type=1400 audit(1734099927.837:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.886539 kernel: audit: type=1400 audit(1734099927.837:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.928781 kernel: audit: type=1400 audit(1734099927.837:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.929025 kernel: audit: type=1400 audit(1734099927.837:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.970272 kernel: audit: type=1400 audit(1734099927.837:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.970427 kernel: audit: type=1400 audit(1734099927.837:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:28.011420 kernel: audit: type=1400 audit(1734099927.837:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:28.035543 kernel: audit: type=1400 audit(1734099927.837:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.887000 audit: BPF prog-id=122 op=LOAD Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2869 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333333636338666638653439396231366536633034663262316164 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2869 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333333636338666638653439396231366536633034663262316164 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:28.057312 kernel: audit: type=1400 audit(1734099927.887:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.895000 audit: BPF prog-id=123 op=LOAD Dec 13 14:25:27.895000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d8c30 items=0 ppid=2869 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333333636338666638653439396231366536633034663262316164 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit: BPF prog-id=124 op=LOAD Dec 13 14:25:27.905000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d8c78 items=0 ppid=2869 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333333636338666638653439396231366536633034663262316164 Dec 13 14:25:27.905000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:25:27.905000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:27.905000 audit: BPF prog-id=125 op=LOAD Dec 13 14:25:27.905000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9088 items=0 ppid=2869 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333333636338666638653439396231366536633034663262316164 Dec 13 14:25:28.060853 env[1231]: time="2024-12-13T14:25:28.060781631Z" level=info msg="StartContainer for \"c5333cc8ff8e499b16e6c04f2b1ad4c890f6b88169fcbf4965d80e1892b1db84\" returns successfully" Dec 13 14:25:28.087000 audit[2948]: AVC avc: denied { search } for pid=2948 comm="rpcbind" name="crypto" dev="proc" ino=22342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:25:28.087000 audit[2948]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc9b4b940c0 a2=0 a3=0 items=0 ppid=2930 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 key=(null) Dec 13 14:25:28.087000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:25:28.133000 audit[2953]: AVC avc: denied { search } for pid=2953 comm="dbus-daemon" name="crypto" dev="proc" ino=22342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:25:28.133000 audit[2953]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fac2d3080c0 a2=0 a3=0 items=0 ppid=2930 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 key=(null) Dec 13 14:25:28.133000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:25:28.137000 audit[2954]: AVC avc: denied { watch } for pid=2954 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538702 scontext=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c760,c926 tclass=dir permissive=0 Dec 13 14:25:28.137000 audit[2954]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=556a95acc040 a2=2c8 a3=7ffd0084997c items=0 ppid=2930 pid=2954 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 key=(null) Dec 13 14:25:28.137000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:25:28.143000 audit[2955]: AVC avc: denied { read } for pid=2955 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22962 scontext=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:25:28.143000 audit[2955]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ff031931320 a1=80000 a2=d a3=7ffc68ed3ed0 items=0 ppid=2930 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 key=(null) Dec 13 14:25:28.143000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:25:28.144000 audit[2955]: AVC avc: denied { search } for pid=2955 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:25:28.144000 audit[2955]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff030e850c0 a2=0 a3=0 items=0 ppid=2930 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c760,c926 key=(null) Dec 13 14:25:28.144000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:25:28.341696 kubelet[1556]: E1213 14:25:28.341530 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:28.756618 kubelet[1556]: I1213 14:25:28.756544 1556 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.713358907 podStartE2EDuration="8.756522668s" podCreationTimestamp="2024-12-13 14:25:20 +0000 UTC" firstStartedPulling="2024-12-13 14:25:21.712351482 +0000 UTC m=+42.075098214" lastFinishedPulling="2024-12-13 14:25:27.755515258 +0000 UTC m=+48.118261975" observedRunningTime="2024-12-13 14:25:28.756242334 +0000 UTC m=+49.118989076" watchObservedRunningTime="2024-12-13 14:25:28.756522668 +0000 UTC m=+49.119269412" Dec 13 14:25:28.775000 audit[2976]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:28.775000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdb79d0ee0 a2=0 a3=7ffdb79d0ecc items=0 ppid=1811 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:28.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:28.781000 audit[2976]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:28.781000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb79d0ee0 a2=0 a3=7ffdb79d0ecc items=0 ppid=1811 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:28.781000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:29.342022 kubelet[1556]: E1213 14:25:29.341947 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:30.342785 kubelet[1556]: E1213 14:25:30.342713 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:31.343663 kubelet[1556]: E1213 14:25:31.343586 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:32.344574 kubelet[1556]: E1213 14:25:32.344500 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:33.345404 kubelet[1556]: E1213 14:25:33.345325 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:34.346623 kubelet[1556]: E1213 14:25:34.346546 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:35.347403 kubelet[1556]: E1213 14:25:35.347328 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:36.347761 kubelet[1556]: E1213 14:25:36.347691 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:37.348372 kubelet[1556]: E1213 14:25:37.348287 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:37.759091 systemd[1]: Created slice kubepods-besteffort-pod3ab71e1f_16b7_4703_8aea_8b0d02f68543.slice. Dec 13 14:25:37.864039 kubelet[1556]: I1213 14:25:37.863974 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7j9g\" (UniqueName: \"kubernetes.io/projected/3ab71e1f-16b7-4703-8aea-8b0d02f68543-kube-api-access-f7j9g\") pod \"test-pod-1\" (UID: \"3ab71e1f-16b7-4703-8aea-8b0d02f68543\") " pod="default/test-pod-1" Dec 13 14:25:37.864039 kubelet[1556]: I1213 14:25:37.864034 1556 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0bde1650-3881-4755-80a9-1a053f773f89\" (UniqueName: \"kubernetes.io/nfs/3ab71e1f-16b7-4703-8aea-8b0d02f68543-pvc-0bde1650-3881-4755-80a9-1a053f773f89\") pod \"test-pod-1\" (UID: \"3ab71e1f-16b7-4703-8aea-8b0d02f68543\") " pod="default/test-pod-1" Dec 13 14:25:38.004247 kernel: Failed to create system directory netfs Dec 13 14:25:38.004429 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:25:38.004473 kernel: audit: type=1400 audit(1734099937.992:766): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.004526 kernel: Failed to create system directory netfs Dec 13 14:25:38.004561 kernel: Failed to create system directory netfs Dec 13 14:25:37.992000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.032562 kernel: audit: type=1400 audit(1734099937.992:766): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.032749 kernel: Failed to create system directory netfs Dec 13 14:25:37.992000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.089167 kernel: audit: type=1400 audit(1734099937.992:766): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:37.992000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:37.992000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.114222 kernel: audit: type=1400 audit(1734099937.992:766): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:37.992000 audit[2984]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5604d93de5e0 a1=153bc a2=5604c99192b0 a3=5 items=0 ppid=56 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:37.992000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:25:38.163698 kernel: audit: type=1300 audit(1734099937.992:766): arch=c000003e syscall=175 success=yes exit=0 a0=5604d93de5e0 a1=153bc a2=5604c99192b0 a3=5 items=0 ppid=56 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:38.163824 kernel: audit: type=1327 audit(1734099937.992:766): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:25:38.164496 kernel: Failed to create system directory fscache Dec 13 14:25:38.169216 kernel: audit: type=1400 audit(1734099938.135:767): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.197651 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.198234 kernel: audit: type=1400 audit(1734099938.135:767): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.226465 kernel: Failed to create system directory fscache Dec 13 14:25:38.226592 kernel: audit: type=1400 audit(1734099938.135:767): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.249735 kernel: Failed to create system directory fscache Dec 13 14:25:38.278224 kernel: audit: type=1400 audit(1734099938.135:767): avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.278383 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.288648 kernel: Failed to create system directory fscache Dec 13 14:25:38.288791 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.299718 kernel: Failed to create system directory fscache Dec 13 14:25:38.299804 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.310477 kernel: Failed to create system directory fscache Dec 13 14:25:38.310577 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.321619 kernel: Failed to create system directory fscache Dec 13 14:25:38.321742 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.135000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.332095 kernel: Failed to create system directory fscache Dec 13 14:25:38.135000 audit[2984]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5604d95f39c0 a1=4c0fc a2=5604c99192b0 a3=5 items=0 ppid=56 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:38.135000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:25:38.337222 kernel: FS-Cache: Loaded Dec 13 14:25:38.348652 kubelet[1556]: E1213 14:25:38.348578 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.388695 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.388809 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.388848 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.393851 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.404056 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.404180 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.414764 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.414883 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.424999 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.425124 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.435283 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.435418 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.445547 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.445662 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.455982 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.456092 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.466248 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.466332 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.476648 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.476743 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.486871 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.486977 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.497115 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.497230 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.507550 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.507712 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.517807 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.517946 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.528056 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.528223 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.543429 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.543558 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.543635 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.553702 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.553792 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.563943 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.564030 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.574277 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.574366 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.584521 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.584638 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.594772 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.594892 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.605037 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.605182 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.615322 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.615448 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.625572 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.625720 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.636105 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.636251 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.646372 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.646528 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.652236 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.657230 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.667156 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.667290 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.677552 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.677635 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.687806 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.687940 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.698231 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.698359 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.708664 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.708753 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.718901 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.719006 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.729184 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.729305 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.739776 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.739877 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.750033 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.750151 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.760285 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.760366 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.770573 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.770669 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.781031 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.781151 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.791300 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.791426 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.801635 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.801797 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.811914 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.812033 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.822202 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.822339 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.832585 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.832720 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.841508 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.843227 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.854035 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.854159 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.864412 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.864537 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.874703 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.874835 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.885059 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.885172 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.895344 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.895459 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.905651 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.905789 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.915968 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.916099 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.926486 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.926602 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.936923 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.937026 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.947155 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.947306 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.957465 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.957588 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.962617 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.972927 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.973010 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.983174 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.983299 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.993507 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.993649 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.003911 kernel: Failed to create system directory sunrpc Dec 13 14:25:39.004034 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.014183 kernel: Failed to create system directory sunrpc Dec 13 14:25:39.014337 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.024567 kernel: Failed to create system directory sunrpc Dec 13 14:25:39.024723 kernel: Failed to create system directory sunrpc Dec 13 14:25:38.366000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.049975 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:25:39.050153 kernel: RPC: Registered udp transport module. Dec 13 14:25:39.050212 kernel: RPC: Registered tcp transport module. Dec 13 14:25:39.054783 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:25:38.366000 audit[2984]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5604d963fad0 a1=1a7f1c a2=5604c99192b0 a3=5 items=6 ppid=56 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:38.366000 audit: CWD cwd="/" Dec 13 14:25:38.366000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:38.366000 audit: PATH item=1 name=(null) inode=23572 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:38.366000 audit: PATH item=2 name=(null) inode=23572 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:38.366000 audit: PATH item=3 name=(null) inode=23573 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:38.366000 audit: PATH item=4 name=(null) inode=23572 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:38.366000 audit: PATH item=5 name=(null) inode=23574 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:38.366000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.122563 kernel: Failed to create system directory nfs Dec 13 14:25:39.122723 kernel: Failed to create system directory nfs Dec 13 14:25:39.122765 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.132345 kernel: Failed to create system directory nfs Dec 13 14:25:39.132512 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.142137 kernel: Failed to create system directory nfs Dec 13 14:25:39.142279 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.152084 kernel: Failed to create system directory nfs Dec 13 14:25:39.152275 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.157180 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.166904 kernel: Failed to create system directory nfs Dec 13 14:25:39.167022 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.176690 kernel: Failed to create system directory nfs Dec 13 14:25:39.176799 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.186422 kernel: Failed to create system directory nfs Dec 13 14:25:39.186529 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.196237 kernel: Failed to create system directory nfs Dec 13 14:25:39.196428 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.206074 kernel: Failed to create system directory nfs Dec 13 14:25:39.206226 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.215839 kernel: Failed to create system directory nfs Dec 13 14:25:39.215969 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.225695 kernel: Failed to create system directory nfs Dec 13 14:25:39.225826 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.235455 kernel: Failed to create system directory nfs Dec 13 14:25:39.235592 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.240367 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.250487 kernel: Failed to create system directory nfs Dec 13 14:25:39.250653 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.260460 kernel: Failed to create system directory nfs Dec 13 14:25:39.260632 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.270246 kernel: Failed to create system directory nfs Dec 13 14:25:39.270364 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.280324 kernel: Failed to create system directory nfs Dec 13 14:25:39.280454 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.290057 kernel: Failed to create system directory nfs Dec 13 14:25:39.290165 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.300227 kernel: Failed to create system directory nfs Dec 13 14:25:39.300394 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.310022 kernel: Failed to create system directory nfs Dec 13 14:25:39.310174 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.320086 kernel: Failed to create system directory nfs Dec 13 14:25:39.320257 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.329767 kernel: Failed to create system directory nfs Dec 13 14:25:39.329919 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.339562 kernel: Failed to create system directory nfs Dec 13 14:25:39.339673 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.349597 kernel: Failed to create system directory nfs Dec 13 14:25:39.349732 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.349888 kubelet[1556]: E1213 14:25:39.349490 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.359456 kernel: Failed to create system directory nfs Dec 13 14:25:39.359549 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.369085 kernel: Failed to create system directory nfs Dec 13 14:25:39.369223 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.378845 kernel: Failed to create system directory nfs Dec 13 14:25:39.378981 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.383832 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.393555 kernel: Failed to create system directory nfs Dec 13 14:25:39.393682 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.403320 kernel: Failed to create system directory nfs Dec 13 14:25:39.403450 kernel: Failed to create system directory nfs Dec 13 14:25:39.102000 audit[2984]: AVC avc: denied { confidentiality } for pid=2984 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.437278 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:25:39.102000 audit[2984]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5604d9860700 a1=16e97c a2=5604c99192b0 a3=5 items=0 ppid=56 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.102000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.498119 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.498325 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.498372 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.508152 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.508335 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.518140 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.518320 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.528104 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.528292 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.532933 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.538456 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.543266 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.548755 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.558780 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.558916 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.568674 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.568801 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.578748 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.578910 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.589128 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.589233 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.599130 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.599258 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.604345 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.609375 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.619341 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.619478 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.629665 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.629807 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.639787 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.639961 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.650051 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.650249 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.655380 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.665556 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.665691 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.675527 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.675696 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.685534 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.685654 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.695485 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.695590 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.705411 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.705519 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.715410 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.715546 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.725692 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.725850 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.735735 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.735833 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.745969 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.746110 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.751025 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.761228 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.761372 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.767378 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.776235 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.776348 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.786208 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.786333 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.796143 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.796271 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.801220 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.811064 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.811163 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.821021 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.821165 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.831177 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.831330 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.841214 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.841338 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.851053 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.851173 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.860960 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.861071 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.870958 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.871076 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.880956 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.886027 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.886128 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.896047 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.896177 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.906136 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.906268 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.916588 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.916701 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.926570 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.926706 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.936973 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.937138 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.946942 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.947049 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:39.956943 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.957044 kernel: Failed to create system directory nfs4 Dec 13 14:25:39.473000 audit[2989]: AVC avc: denied { confidentiality } for pid=2989 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.135699 kernel: NFS: Registering the id_resolver key type Dec 13 14:25:40.135858 kernel: Key type id_resolver registered Dec 13 14:25:40.135921 kernel: Key type id_legacy registered Dec 13 14:25:39.473000 audit[2989]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f262730f010 a1=208de4 a2=55e55320e2b0 a3=5 items=0 ppid=56 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.473000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.167580 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.167734 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.167771 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.177835 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.177950 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.188048 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.188164 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.198340 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.198449 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.208917 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.209038 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.219212 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.219333 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.229619 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.229723 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.240032 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.240180 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.250314 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.250392 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.260661 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.260789 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.271022 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.271125 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.281324 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.281399 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.152000 audit[2990]: AVC avc: denied { confidentiality } for pid=2990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:25:40.288638 kubelet[1556]: E1213 14:25:40.288510 1556 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:40.291637 kernel: Failed to create system directory rpcgss Dec 13 14:25:40.152000 audit[2990]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3bc4d6f010 a1=70af4 a2=563c6af7a2b0 a3=5 items=0 ppid=56 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.152000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:25:40.329268 env[1231]: time="2024-12-13T14:25:40.329036830Z" level=info msg="StopPodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\"" Dec 13 14:25:40.330629 nfsidmap[2998]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:25:40.344061 nfsidmap[3000]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:25:40.358223 kubelet[1556]: E1213 14:25:40.357422 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:40.359000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:25:40.359000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:25:40.359000 audit[1352]: AVC avc: denied { watch_reads } for pid=1352 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:25:40.359000 audit[1352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5565ef63b720 a2=10 a3=ec9ebc6dc346959e items=0 ppid=1 pid=1352 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.359000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:25:40.359000 audit[1352]: AVC avc: denied { watch_reads } for pid=1352 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:25:40.359000 audit[1352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5565ef63b720 a2=10 a3=ec9ebc6dc346959e items=0 ppid=1 pid=1352 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.359000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.391 [WARNING][3012] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-csi--node--driver--drh82-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"409c84be-1dd3-45f0-acf6-5a3813da3839", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623", Pod:"csi-node-driver-drh82", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid49f48da506", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.391 [INFO][3012] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.391 [INFO][3012] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" iface="eth0" netns="" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.392 [INFO][3012] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.392 [INFO][3012] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.426 [INFO][3018] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.426 [INFO][3018] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.426 [INFO][3018] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.433 [WARNING][3018] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.434 [INFO][3018] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.435 [INFO][3018] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:40.438038 env[1231]: 2024-12-13 14:25:40.436 [INFO][3012] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.439047 env[1231]: time="2024-12-13T14:25:40.438985288Z" level=info msg="TearDown network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" successfully" Dec 13 14:25:40.439047 env[1231]: time="2024-12-13T14:25:40.439042353Z" level=info msg="StopPodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" returns successfully" Dec 13 14:25:40.439847 env[1231]: time="2024-12-13T14:25:40.439778793Z" level=info msg="RemovePodSandbox for \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\"" Dec 13 14:25:40.439981 env[1231]: time="2024-12-13T14:25:40.439826484Z" level=info msg="Forcibly stopping sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\"" Dec 13 14:25:40.464426 env[1231]: time="2024-12-13T14:25:40.464360486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3ab71e1f-16b7-4703-8aea-8b0d02f68543,Namespace:default,Attempt:0,}" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.521 [WARNING][3037] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-csi--node--driver--drh82-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"409c84be-1dd3-45f0-acf6-5a3813da3839", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"4e52e4df3d8dccd4725188fa459466e45a5989cbdc8cd005b4ca880689fe7623", Pod:"csi-node-driver-drh82", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid49f48da506", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.522 [INFO][3037] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.522 [INFO][3037] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" iface="eth0" netns="" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.522 [INFO][3037] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.522 [INFO][3037] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.567 [INFO][3056] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.567 [INFO][3056] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.567 [INFO][3056] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.576 [WARNING][3056] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.576 [INFO][3056] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" HandleID="k8s-pod-network.f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Workload="10.128.0.71-k8s-csi--node--driver--drh82-eth0" Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.578 [INFO][3056] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:40.581642 env[1231]: 2024-12-13 14:25:40.580 [INFO][3037] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326" Dec 13 14:25:40.582364 env[1231]: time="2024-12-13T14:25:40.582306918Z" level=info msg="TearDown network for sandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" successfully" Dec 13 14:25:40.586825 env[1231]: time="2024-12-13T14:25:40.586763129Z" level=info msg="RemovePodSandbox \"f6a48f4f0b522359e5428b0d305f61a656d1b5acfa9dd46756ac0ae398d62326\" returns successfully" Dec 13 14:25:40.588048 env[1231]: time="2024-12-13T14:25:40.587984184Z" level=info msg="StopPodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\"" Dec 13 14:25:40.691918 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Dec 13 14:25:40.701221 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:25:40.710236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:25:40.712566 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.658 [WARNING][3083] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"9e646497-7e35-49f4-bcc5-a3b321cc82fd", ResourceVersion:"1103", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3", Pod:"nginx-deployment-8587fbcb89-jzxrx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie168eec211e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.658 [INFO][3083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.658 [INFO][3083] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" iface="eth0" netns="" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.658 [INFO][3083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.658 [INFO][3083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.697 [INFO][3091] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.697 [INFO][3091] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.697 [INFO][3091] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.714 [WARNING][3091] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.714 [INFO][3091] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.719 [INFO][3091] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:40.729736 env[1231]: 2024-12-13 14:25:40.728 [INFO][3083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.730519 env[1231]: time="2024-12-13T14:25:40.729778702Z" level=info msg="TearDown network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" successfully" Dec 13 14:25:40.730519 env[1231]: time="2024-12-13T14:25:40.729821952Z" level=info msg="StopPodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" returns successfully" Dec 13 14:25:40.733434 env[1231]: time="2024-12-13T14:25:40.733391806Z" level=info msg="RemovePodSandbox for \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\"" Dec 13 14:25:40.734011 env[1231]: time="2024-12-13T14:25:40.733903310Z" level=info msg="Forcibly stopping sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\"" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.579 [INFO][3043] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.71-k8s-test--pod--1-eth0 default 3ab71e1f-16b7-4703-8aea-8b0d02f68543 1218 0 2024-12-13 14:25:21 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.71 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.579 [INFO][3043] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.634 [INFO][3068] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" HandleID="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Workload="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.650 [INFO][3068] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" HandleID="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Workload="10.128.0.71-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000340dd0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.71", "pod":"test-pod-1", "timestamp":"2024-12-13 14:25:40.634340778 +0000 UTC"}, Hostname:"10.128.0.71", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.650 [INFO][3068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.650 [INFO][3068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.650 [INFO][3068] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.71' Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.655 [INFO][3068] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.660 [INFO][3068] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.665 [INFO][3068] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.668 [INFO][3068] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.670 [INFO][3068] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.670 [INFO][3068] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.672 [INFO][3068] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2 Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.678 [INFO][3068] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.685 [INFO][3068] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.68/26] block=192.168.127.64/26 handle="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.685 [INFO][3068] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.68/26] handle="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" host="10.128.0.71" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.685 [INFO][3068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.685 [INFO][3068] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.68/26] IPv6=[] ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" HandleID="k8s-pod-network.659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Workload="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.736621 env[1231]: 2024-12-13 14:25:40.687 [INFO][3043] cni-plugin/k8s.go 386: Populated endpoint ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3ab71e1f-16b7-4703-8aea-8b0d02f68543", ResourceVersion:"1218", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:40.738668 env[1231]: 2024-12-13 14:25:40.688 [INFO][3043] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.68/32] ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.738668 env[1231]: 2024-12-13 14:25:40.688 [INFO][3043] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.738668 env[1231]: 2024-12-13 14:25:40.717 [INFO][3043] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.738668 env[1231]: 2024-12-13 14:25:40.718 [INFO][3043] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3ab71e1f-16b7-4703-8aea-8b0d02f68543", ResourceVersion:"1218", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"56:1a:27:0f:c5:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:40.738668 env[1231]: 2024-12-13 14:25:40.732 [INFO][3043] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.71-k8s-test--pod--1-eth0" Dec 13 14:25:40.755000 audit[3112]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:25:40.755000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffcc62b44a0 a2=0 a3=7ffcc62b448c items=0 ppid=2226 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.755000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:25:40.789589 env[1231]: time="2024-12-13T14:25:40.789491805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:40.790755 env[1231]: time="2024-12-13T14:25:40.789553112Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:40.790755 env[1231]: time="2024-12-13T14:25:40.789582307Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:40.790755 env[1231]: time="2024-12-13T14:25:40.789808727Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2 pid=3137 runtime=io.containerd.runc.v2 Dec 13 14:25:40.820963 systemd[1]: Started cri-containerd-659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2.scope. Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.850000 audit: BPF prog-id=126 op=LOAD Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3137 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635396233643735643863626433396462636639636661616363623962 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3137 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635396233643735643863626433396462636639636661616363623962 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit: BPF prog-id=127 op=LOAD Dec 13 14:25:40.852000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003813a0 items=0 ppid=3137 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635396233643735643863626433396462636639636661616363623962 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit: BPF prog-id=128 op=LOAD Dec 13 14:25:40.852000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003813e8 items=0 ppid=3137 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635396233643735643863626433396462636639636661616363623962 Dec 13 14:25:40.852000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:25:40.852000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:40.852000 audit: BPF prog-id=129 op=LOAD Dec 13 14:25:40.852000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003817f8 items=0 ppid=3137 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:40.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635396233643735643863626433396462636639636661616363623962 Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.829 [WARNING][3123] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"9e646497-7e35-49f4-bcc5-a3b321cc82fd", ResourceVersion:"1103", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 24, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.71", ContainerID:"dc84941388afac68f141e5853a349127997846e03a79c1e132a9370eeae517c3", Pod:"nginx-deployment-8587fbcb89-jzxrx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie168eec211e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.829 [INFO][3123] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.829 [INFO][3123] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" iface="eth0" netns="" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.829 [INFO][3123] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.829 [INFO][3123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.892 [INFO][3155] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.892 [INFO][3155] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.892 [INFO][3155] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.900 [WARNING][3155] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.900 [INFO][3155] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" HandleID="k8s-pod-network.d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Workload="10.128.0.71-k8s-nginx--deployment--8587fbcb89--jzxrx-eth0" Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.902 [INFO][3155] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:25:40.906092 env[1231]: 2024-12-13 14:25:40.904 [INFO][3123] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d" Dec 13 14:25:40.906995 env[1231]: time="2024-12-13T14:25:40.906134106Z" level=info msg="TearDown network for sandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" successfully" Dec 13 14:25:40.908340 env[1231]: time="2024-12-13T14:25:40.908290429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3ab71e1f-16b7-4703-8aea-8b0d02f68543,Namespace:default,Attempt:0,} returns sandbox id \"659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2\"" Dec 13 14:25:40.910754 env[1231]: time="2024-12-13T14:25:40.910697273Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:25:40.911012 env[1231]: time="2024-12-13T14:25:40.910948849Z" level=info msg="RemovePodSandbox \"d1b11a2bfe89dcd9f8b74bac2034e5eebb2977775298e9788654d4848fef995d\" returns successfully" Dec 13 14:25:41.271100 env[1231]: time="2024-12-13T14:25:41.271028219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:41.273901 env[1231]: time="2024-12-13T14:25:41.273854540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:41.276428 env[1231]: time="2024-12-13T14:25:41.276388502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:41.283972 env[1231]: time="2024-12-13T14:25:41.283916008Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:25:41.285226 env[1231]: time="2024-12-13T14:25:41.285170895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:41.289092 env[1231]: time="2024-12-13T14:25:41.289033355Z" level=info msg="CreateContainer within sandbox \"659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:25:41.306113 env[1231]: time="2024-12-13T14:25:41.306050076Z" level=info msg="CreateContainer within sandbox \"659b3d75d8cbd39dbcf9cfaaccb9bfd34012f87e0edad4559e5eb6b5a36139e2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"799bd20da1326da3a47887526567bbf5cfb7930219c153a565b6c0f28b1c1ab8\"" Dec 13 14:25:41.307040 env[1231]: time="2024-12-13T14:25:41.306968064Z" level=info msg="StartContainer for \"799bd20da1326da3a47887526567bbf5cfb7930219c153a565b6c0f28b1c1ab8\"" Dec 13 14:25:41.330487 systemd[1]: Started cri-containerd-799bd20da1326da3a47887526567bbf5cfb7930219c153a565b6c0f28b1c1ab8.scope. Dec 13 14:25:41.358497 kubelet[1556]: E1213 14:25:41.358410 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.358000 audit: BPF prog-id=130 op=LOAD Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3137 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:41.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739396264323064613133323664613361343738383735323635363762 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3137 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:41.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739396264323064613133323664613361343738383735323635363762 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit: BPF prog-id=131 op=LOAD Dec 13 14:25:41.359000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025ba0 items=0 ppid=3137 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:41.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739396264323064613133323664613361343738383735323635363762 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.359000 audit: BPF prog-id=132 op=LOAD Dec 13 14:25:41.359000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000025be8 items=0 ppid=3137 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:41.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739396264323064613133323664613361343738383735323635363762 Dec 13 14:25:41.359000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:25:41.359000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:41.360000 audit: BPF prog-id=133 op=LOAD Dec 13 14:25:41.360000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000025ff8 items=0 ppid=3137 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:41.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739396264323064613133323664613361343738383735323635363762 Dec 13 14:25:41.382235 env[1231]: time="2024-12-13T14:25:41.380646540Z" level=info msg="StartContainer for \"799bd20da1326da3a47887526567bbf5cfb7930219c153a565b6c0f28b1c1ab8\" returns successfully" Dec 13 14:25:41.791964 kubelet[1556]: I1213 14:25:41.791880 1556 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=20.414939895 podStartE2EDuration="20.791845984s" podCreationTimestamp="2024-12-13 14:25:21 +0000 UTC" firstStartedPulling="2024-12-13 14:25:40.910134492 +0000 UTC m=+61.272881212" lastFinishedPulling="2024-12-13 14:25:41.28704058 +0000 UTC m=+61.649787301" observedRunningTime="2024-12-13 14:25:41.791539243 +0000 UTC m=+62.154285988" watchObservedRunningTime="2024-12-13 14:25:41.791845984 +0000 UTC m=+62.154592726" Dec 13 14:25:42.358998 kubelet[1556]: E1213 14:25:42.358950 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:42.422681 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:25:43.359572 kubelet[1556]: E1213 14:25:43.359499 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:43.962910 systemd[1]: run-containerd-runc-k8s.io-4032b5f1aafbf993b10f3b11d5e71f43938a364e1106417da1e65de6c960432f-runc.2YxpxP.mount: Deactivated successfully. Dec 13 14:25:44.360331 kubelet[1556]: E1213 14:25:44.360171 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:45.361044 kubelet[1556]: E1213 14:25:45.360985 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:46.361618 kubelet[1556]: E1213 14:25:46.361544 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:47.362319 kubelet[1556]: E1213 14:25:47.362247 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:25:48.363307 kubelet[1556]: E1213 14:25:48.363224 1556 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"