Dec 13 03:55:35.032448 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 03:55:35.032470 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:55:35.032483 kernel: BIOS-provided physical RAM map: Dec 13 03:55:35.032490 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 03:55:35.032497 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 03:55:35.032504 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 03:55:35.032512 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 03:55:35.032519 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 03:55:35.032527 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 03:55:35.032534 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 03:55:35.032540 kernel: NX (Execute Disable) protection: active Dec 13 03:55:35.032547 kernel: SMBIOS 2.8 present. Dec 13 03:55:35.032554 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 03:55:35.032561 kernel: Hypervisor detected: KVM Dec 13 03:55:35.032569 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 03:55:35.032577 kernel: kvm-clock: cpu 0, msr 6c19b001, primary cpu clock Dec 13 03:55:35.032584 kernel: kvm-clock: using sched offset of 7739266611 cycles Dec 13 03:55:35.032592 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 03:55:35.032600 kernel: tsc: Detected 1996.249 MHz processor Dec 13 03:55:35.032607 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 03:55:35.032615 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 03:55:35.032622 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 03:55:35.032630 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 03:55:35.032638 kernel: ACPI: Early table checksum verification disabled Dec 13 03:55:35.032645 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 03:55:35.032653 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:55:35.032660 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:55:35.032668 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:55:35.032675 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 03:55:35.032682 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:55:35.032689 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:55:35.032697 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 03:55:35.032705 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 03:55:35.032713 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 03:55:35.032720 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 03:55:35.032727 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 03:55:35.032734 kernel: No NUMA configuration found Dec 13 03:55:35.032741 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 03:55:35.032748 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 03:55:35.032756 kernel: Zone ranges: Dec 13 03:55:35.032767 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 03:55:35.032774 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 03:55:35.032782 kernel: Normal empty Dec 13 03:55:35.032790 kernel: Movable zone start for each node Dec 13 03:55:35.032797 kernel: Early memory node ranges Dec 13 03:55:35.032805 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 03:55:35.032814 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 03:55:35.032821 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 03:55:35.032829 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 03:55:35.032836 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 03:55:35.032844 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 03:55:35.032851 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 03:55:35.032859 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 03:55:35.032866 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 03:55:35.032874 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 03:55:35.032883 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 03:55:35.032891 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 03:55:35.032898 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 03:55:35.032906 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 03:55:35.032914 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 03:55:35.032921 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 03:55:35.032929 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 03:55:35.032936 kernel: Booting paravirtualized kernel on KVM Dec 13 03:55:35.032944 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 03:55:35.032952 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 03:55:35.032962 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 03:55:35.032969 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 03:55:35.032977 kernel: pcpu-alloc: [0] 0 1 Dec 13 03:55:35.032984 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 13 03:55:35.032992 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 03:55:35.032999 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 03:55:35.033007 kernel: Policy zone: DMA32 Dec 13 03:55:35.033016 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:55:35.033026 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 03:55:35.033033 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:55:35.033041 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 03:55:35.033049 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 03:55:35.033057 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 123076K reserved, 0K cma-reserved) Dec 13 03:55:35.033065 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 03:55:35.033072 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 03:55:35.033080 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 03:55:35.033089 kernel: rcu: Hierarchical RCU implementation. Dec 13 03:55:35.033097 kernel: rcu: RCU event tracing is enabled. Dec 13 03:55:35.033105 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 03:55:35.033113 kernel: Rude variant of Tasks RCU enabled. Dec 13 03:55:35.033120 kernel: Tracing variant of Tasks RCU enabled. Dec 13 03:55:35.033128 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 03:55:35.033136 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 03:55:35.033143 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 03:55:35.033151 kernel: Console: colour VGA+ 80x25 Dec 13 03:55:35.033159 kernel: printk: console [tty0] enabled Dec 13 03:55:35.033167 kernel: printk: console [ttyS0] enabled Dec 13 03:55:35.033175 kernel: ACPI: Core revision 20210730 Dec 13 03:55:35.033182 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 03:55:35.033190 kernel: x2apic enabled Dec 13 03:55:35.033197 kernel: Switched APIC routing to physical x2apic. Dec 13 03:55:35.033205 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 03:55:35.033212 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 03:55:35.033220 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 03:55:35.033227 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 03:55:35.033236 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 03:55:35.033244 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 03:55:35.033252 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 03:55:35.033259 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 03:55:35.033267 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 03:55:35.033274 kernel: Speculative Store Bypass: Vulnerable Dec 13 03:55:35.033282 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 03:55:35.033289 kernel: Freeing SMP alternatives memory: 32K Dec 13 03:55:35.033297 kernel: pid_max: default: 32768 minimum: 301 Dec 13 03:55:35.033306 kernel: LSM: Security Framework initializing Dec 13 03:55:35.033313 kernel: SELinux: Initializing. Dec 13 03:55:35.033321 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 03:55:35.033328 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 03:55:35.033336 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 03:55:35.033362 kernel: Performance Events: AMD PMU driver. Dec 13 03:55:35.033370 kernel: ... version: 0 Dec 13 03:55:35.033377 kernel: ... bit width: 48 Dec 13 03:55:35.033385 kernel: ... generic registers: 4 Dec 13 03:55:35.033399 kernel: ... value mask: 0000ffffffffffff Dec 13 03:55:35.033407 kernel: ... max period: 00007fffffffffff Dec 13 03:55:35.033416 kernel: ... fixed-purpose events: 0 Dec 13 03:55:35.033424 kernel: ... event mask: 000000000000000f Dec 13 03:55:35.033432 kernel: signal: max sigframe size: 1440 Dec 13 03:55:35.033440 kernel: rcu: Hierarchical SRCU implementation. Dec 13 03:55:35.033448 kernel: smp: Bringing up secondary CPUs ... Dec 13 03:55:35.033456 kernel: x86: Booting SMP configuration: Dec 13 03:55:35.033465 kernel: .... node #0, CPUs: #1 Dec 13 03:55:35.033473 kernel: kvm-clock: cpu 1, msr 6c19b041, secondary cpu clock Dec 13 03:55:35.033480 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 13 03:55:35.033488 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 03:55:35.033496 kernel: smpboot: Max logical packages: 2 Dec 13 03:55:35.033504 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 03:55:35.033512 kernel: devtmpfs: initialized Dec 13 03:55:35.033520 kernel: x86/mm: Memory block size: 128MB Dec 13 03:55:35.033528 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 03:55:35.033537 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 03:55:35.033545 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 03:55:35.033553 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 03:55:35.033561 kernel: audit: initializing netlink subsys (disabled) Dec 13 03:55:35.033569 kernel: audit: type=2000 audit(1734062134.290:1): state=initialized audit_enabled=0 res=1 Dec 13 03:55:35.033577 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 03:55:35.033585 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 03:55:35.033592 kernel: cpuidle: using governor menu Dec 13 03:55:35.033600 kernel: ACPI: bus type PCI registered Dec 13 03:55:35.033610 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 03:55:35.033618 kernel: dca service started, version 1.12.1 Dec 13 03:55:35.033626 kernel: PCI: Using configuration type 1 for base access Dec 13 03:55:35.033634 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 03:55:35.033642 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 03:55:35.033649 kernel: ACPI: Added _OSI(Module Device) Dec 13 03:55:35.033657 kernel: ACPI: Added _OSI(Processor Device) Dec 13 03:55:35.033665 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 03:55:35.033673 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 03:55:35.033682 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 03:55:35.033690 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 03:55:35.033698 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 03:55:35.033706 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 03:55:35.033713 kernel: ACPI: Interpreter enabled Dec 13 03:55:35.033721 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 03:55:35.033729 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 03:55:35.033737 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 03:55:35.033745 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 03:55:35.033754 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 03:55:35.033874 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 03:55:35.033958 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 03:55:35.033971 kernel: acpiphp: Slot [3] registered Dec 13 03:55:35.033979 kernel: acpiphp: Slot [4] registered Dec 13 03:55:35.033987 kernel: acpiphp: Slot [5] registered Dec 13 03:55:35.033995 kernel: acpiphp: Slot [6] registered Dec 13 03:55:35.034006 kernel: acpiphp: Slot [7] registered Dec 13 03:55:35.034014 kernel: acpiphp: Slot [8] registered Dec 13 03:55:35.034022 kernel: acpiphp: Slot [9] registered Dec 13 03:55:35.034030 kernel: acpiphp: Slot [10] registered Dec 13 03:55:35.034038 kernel: acpiphp: Slot [11] registered Dec 13 03:55:35.034046 kernel: acpiphp: Slot [12] registered Dec 13 03:55:35.034054 kernel: acpiphp: Slot [13] registered Dec 13 03:55:35.034062 kernel: acpiphp: Slot [14] registered Dec 13 03:55:35.034070 kernel: acpiphp: Slot [15] registered Dec 13 03:55:35.034078 kernel: acpiphp: Slot [16] registered Dec 13 03:55:35.034087 kernel: acpiphp: Slot [17] registered Dec 13 03:55:35.034106 kernel: acpiphp: Slot [18] registered Dec 13 03:55:35.034114 kernel: acpiphp: Slot [19] registered Dec 13 03:55:35.034122 kernel: acpiphp: Slot [20] registered Dec 13 03:55:35.034130 kernel: acpiphp: Slot [21] registered Dec 13 03:55:35.034138 kernel: acpiphp: Slot [22] registered Dec 13 03:55:35.034146 kernel: acpiphp: Slot [23] registered Dec 13 03:55:35.034154 kernel: acpiphp: Slot [24] registered Dec 13 03:55:35.034162 kernel: acpiphp: Slot [25] registered Dec 13 03:55:35.034172 kernel: acpiphp: Slot [26] registered Dec 13 03:55:35.034180 kernel: acpiphp: Slot [27] registered Dec 13 03:55:35.034188 kernel: acpiphp: Slot [28] registered Dec 13 03:55:35.034196 kernel: acpiphp: Slot [29] registered Dec 13 03:55:35.034204 kernel: acpiphp: Slot [30] registered Dec 13 03:55:35.034211 kernel: acpiphp: Slot [31] registered Dec 13 03:55:35.034220 kernel: PCI host bridge to bus 0000:00 Dec 13 03:55:35.034316 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 03:55:35.034425 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 03:55:35.034503 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 03:55:35.034574 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 03:55:35.034645 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 03:55:35.034716 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 03:55:35.034812 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 03:55:35.034910 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 03:55:35.035012 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 03:55:35.035101 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 03:55:35.035192 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 03:55:35.035278 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 03:55:35.035391 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 03:55:35.035482 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 03:55:35.035586 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 03:55:35.035687 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 03:55:35.035776 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 03:55:35.035873 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 03:55:35.035964 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 03:55:35.036058 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 03:55:35.036148 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 03:55:35.036237 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 03:55:35.036320 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 03:55:35.038464 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 03:55:35.038561 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 03:55:35.038650 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 03:55:35.038742 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 03:55:35.038830 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 03:55:35.038937 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 03:55:35.039028 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 03:55:35.039118 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 03:55:35.039201 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 03:55:35.039290 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 03:55:35.042503 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 03:55:35.042607 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 03:55:35.042715 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 03:55:35.042801 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 03:55:35.042883 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 03:55:35.042896 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 03:55:35.042904 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 03:55:35.042913 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 03:55:35.042923 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 03:55:35.042931 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 03:55:35.042949 kernel: iommu: Default domain type: Translated Dec 13 03:55:35.042957 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 03:55:35.043041 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 03:55:35.043123 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 03:55:35.043203 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 03:55:35.043215 kernel: vgaarb: loaded Dec 13 03:55:35.043223 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 03:55:35.043231 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 03:55:35.043240 kernel: PTP clock support registered Dec 13 03:55:35.043251 kernel: PCI: Using ACPI for IRQ routing Dec 13 03:55:35.043259 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 03:55:35.043267 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 03:55:35.043276 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 03:55:35.043284 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 03:55:35.043292 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 03:55:35.043300 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 03:55:35.043308 kernel: pnp: PnP ACPI init Dec 13 03:55:35.043411 kernel: pnp 00:03: [dma 2] Dec 13 03:55:35.043428 kernel: pnp: PnP ACPI: found 5 devices Dec 13 03:55:35.043437 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 03:55:35.043446 kernel: NET: Registered PF_INET protocol family Dec 13 03:55:35.043454 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 03:55:35.043463 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 03:55:35.043472 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 03:55:35.043480 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 03:55:35.043489 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 03:55:35.043499 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 03:55:35.043507 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 03:55:35.043515 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 03:55:35.043524 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 03:55:35.043532 kernel: NET: Registered PF_XDP protocol family Dec 13 03:55:35.043608 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 03:55:35.043681 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 03:55:35.043750 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 03:55:35.043819 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 03:55:35.043903 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 03:55:35.043995 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 03:55:35.044078 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 03:55:35.044160 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 03:55:35.044172 kernel: PCI: CLS 0 bytes, default 64 Dec 13 03:55:35.044181 kernel: Initialise system trusted keyrings Dec 13 03:55:35.044189 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 03:55:35.044200 kernel: Key type asymmetric registered Dec 13 03:55:35.044208 kernel: Asymmetric key parser 'x509' registered Dec 13 03:55:35.044216 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 03:55:35.044224 kernel: io scheduler mq-deadline registered Dec 13 03:55:35.044232 kernel: io scheduler kyber registered Dec 13 03:55:35.044240 kernel: io scheduler bfq registered Dec 13 03:55:35.044248 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 03:55:35.044257 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 03:55:35.044266 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 03:55:35.044274 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 03:55:35.044284 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 03:55:35.044292 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 03:55:35.044301 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 03:55:35.044309 kernel: random: crng init done Dec 13 03:55:35.044317 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 03:55:35.044325 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 03:55:35.044333 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 03:55:35.044443 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 03:55:35.044460 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 03:55:35.044537 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 03:55:35.044610 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T03:55:34 UTC (1734062134) Dec 13 03:55:35.044684 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 03:55:35.044696 kernel: NET: Registered PF_INET6 protocol family Dec 13 03:55:35.044704 kernel: Segment Routing with IPv6 Dec 13 03:55:35.044712 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 03:55:35.044720 kernel: NET: Registered PF_PACKET protocol family Dec 13 03:55:35.044728 kernel: Key type dns_resolver registered Dec 13 03:55:35.044739 kernel: IPI shorthand broadcast: enabled Dec 13 03:55:35.044747 kernel: sched_clock: Marking stable (741200999, 122286085)->(891822042, -28334958) Dec 13 03:55:35.044756 kernel: registered taskstats version 1 Dec 13 03:55:35.044764 kernel: Loading compiled-in X.509 certificates Dec 13 03:55:35.044772 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 03:55:35.044781 kernel: Key type .fscrypt registered Dec 13 03:55:35.044789 kernel: Key type fscrypt-provisioning registered Dec 13 03:55:35.044797 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 03:55:35.044807 kernel: ima: Allocated hash algorithm: sha1 Dec 13 03:55:35.044816 kernel: ima: No architecture policies found Dec 13 03:55:35.044824 kernel: clk: Disabling unused clocks Dec 13 03:55:35.044832 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 03:55:35.044840 kernel: Write protecting the kernel read-only data: 28672k Dec 13 03:55:35.044848 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 03:55:35.044856 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 03:55:35.044865 kernel: Run /init as init process Dec 13 03:55:35.044873 kernel: with arguments: Dec 13 03:55:35.044882 kernel: /init Dec 13 03:55:35.044890 kernel: with environment: Dec 13 03:55:35.044898 kernel: HOME=/ Dec 13 03:55:35.044906 kernel: TERM=linux Dec 13 03:55:35.044914 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 03:55:35.044925 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:55:35.044936 systemd[1]: Detected virtualization kvm. Dec 13 03:55:35.044946 systemd[1]: Detected architecture x86-64. Dec 13 03:55:35.044957 systemd[1]: Running in initrd. Dec 13 03:55:35.044965 systemd[1]: No hostname configured, using default hostname. Dec 13 03:55:35.044974 systemd[1]: Hostname set to . Dec 13 03:55:35.044983 systemd[1]: Initializing machine ID from VM UUID. Dec 13 03:55:35.044992 systemd[1]: Queued start job for default target initrd.target. Dec 13 03:55:35.045001 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:55:35.045010 systemd[1]: Reached target cryptsetup.target. Dec 13 03:55:35.045018 systemd[1]: Reached target paths.target. Dec 13 03:55:35.045028 systemd[1]: Reached target slices.target. Dec 13 03:55:35.045037 systemd[1]: Reached target swap.target. Dec 13 03:55:35.045046 systemd[1]: Reached target timers.target. Dec 13 03:55:35.045055 systemd[1]: Listening on iscsid.socket. Dec 13 03:55:35.045064 systemd[1]: Listening on iscsiuio.socket. Dec 13 03:55:35.045073 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 03:55:35.045081 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 03:55:35.045092 systemd[1]: Listening on systemd-journald.socket. Dec 13 03:55:35.045100 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:55:35.045109 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:55:35.045118 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:55:35.045127 systemd[1]: Reached target sockets.target. Dec 13 03:55:35.045144 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:55:35.045154 systemd[1]: Finished network-cleanup.service. Dec 13 03:55:35.045164 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 03:55:35.045173 systemd[1]: Starting systemd-journald.service... Dec 13 03:55:35.045182 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:55:35.045191 systemd[1]: Starting systemd-resolved.service... Dec 13 03:55:35.045201 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 03:55:35.045210 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:55:35.045218 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 03:55:35.045227 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:55:35.045240 systemd-journald[184]: Journal started Dec 13 03:55:35.045290 systemd-journald[184]: Runtime Journal (/run/log/journal/6a465f57f8824c6cb55ad0fcf65ee5ed) is 4.9M, max 39.5M, 34.5M free. Dec 13 03:55:35.002819 systemd-modules-load[185]: Inserted module 'overlay' Dec 13 03:55:35.074561 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 03:55:35.074584 kernel: Bridge firewalling registered Dec 13 03:55:35.064806 systemd-modules-load[185]: Inserted module 'br_netfilter' Dec 13 03:55:35.065600 systemd-resolved[186]: Positive Trust Anchors: Dec 13 03:55:35.077262 systemd[1]: Started systemd-journald.service. Dec 13 03:55:35.065609 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:55:35.091472 kernel: audit: type=1130 audit(1734062135.077:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.091505 kernel: audit: type=1130 audit(1734062135.083:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.091517 kernel: SCSI subsystem initialized Dec 13 03:55:35.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.065644 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:55:35.102379 kernel: audit: type=1130 audit(1734062135.084:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.102402 kernel: audit: type=1130 audit(1734062135.084:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.068313 systemd-resolved[186]: Defaulting to hostname 'linux'. Dec 13 03:55:35.078027 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:55:35.084177 systemd[1]: Started systemd-resolved.service. Dec 13 03:55:35.084724 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 03:55:35.085230 systemd[1]: Reached target nss-lookup.target. Dec 13 03:55:35.110292 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 03:55:35.110315 kernel: device-mapper: uevent: version 1.0.3 Dec 13 03:55:35.110327 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 03:55:35.099673 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 03:55:35.114332 systemd-modules-load[185]: Inserted module 'dm_multipath' Dec 13 03:55:35.115264 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:55:35.119959 kernel: audit: type=1130 audit(1734062135.115:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.116150 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 03:55:35.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.122496 systemd[1]: Starting dracut-cmdline.service... Dec 13 03:55:35.126945 kernel: audit: type=1130 audit(1734062135.120:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.125832 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:55:35.135322 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:55:35.140280 kernel: audit: type=1130 audit(1734062135.135:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.140422 dracut-cmdline[205]: dracut-dracut-053 Dec 13 03:55:35.140422 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:55:35.208379 kernel: Loading iSCSI transport class v2.0-870. Dec 13 03:55:35.230377 kernel: iscsi: registered transport (tcp) Dec 13 03:55:35.258009 kernel: iscsi: registered transport (qla4xxx) Dec 13 03:55:35.258087 kernel: QLogic iSCSI HBA Driver Dec 13 03:55:35.306027 systemd[1]: Finished dracut-cmdline.service. Dec 13 03:55:35.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.310514 systemd[1]: Starting dracut-pre-udev.service... Dec 13 03:55:35.317742 kernel: audit: type=1130 audit(1734062135.306:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.377471 kernel: raid6: sse2x4 gen() 12786 MB/s Dec 13 03:55:35.394473 kernel: raid6: sse2x4 xor() 4632 MB/s Dec 13 03:55:35.411469 kernel: raid6: sse2x2 gen() 13407 MB/s Dec 13 03:55:35.428695 kernel: raid6: sse2x2 xor() 8222 MB/s Dec 13 03:55:35.445477 kernel: raid6: sse2x1 gen() 10331 MB/s Dec 13 03:55:35.463548 kernel: raid6: sse2x1 xor() 6416 MB/s Dec 13 03:55:35.463648 kernel: raid6: using algorithm sse2x2 gen() 13407 MB/s Dec 13 03:55:35.463675 kernel: raid6: .... xor() 8222 MB/s, rmw enabled Dec 13 03:55:35.464554 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 03:55:35.482415 kernel: xor: measuring software checksum speed Dec 13 03:55:35.482539 kernel: prefetch64-sse : 18093 MB/sec Dec 13 03:55:35.482566 kernel: generic_sse : 15640 MB/sec Dec 13 03:55:35.484539 kernel: xor: using function: prefetch64-sse (18093 MB/sec) Dec 13 03:55:35.606430 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 03:55:35.621117 systemd[1]: Finished dracut-pre-udev.service. Dec 13 03:55:35.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.622881 systemd[1]: Starting systemd-udevd.service... Dec 13 03:55:35.642364 kernel: audit: type=1130 audit(1734062135.621:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.621000 audit: BPF prog-id=7 op=LOAD Dec 13 03:55:35.622000 audit: BPF prog-id=8 op=LOAD Dec 13 03:55:35.647752 systemd-udevd[386]: Using default interface naming scheme 'v252'. Dec 13 03:55:35.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.659383 systemd[1]: Started systemd-udevd.service. Dec 13 03:55:35.660796 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 03:55:35.677316 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation Dec 13 03:55:35.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.717934 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 03:55:35.719498 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:55:35.757146 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:55:35.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:35.837372 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 03:55:35.851961 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 03:55:35.851980 kernel: GPT:17805311 != 41943039 Dec 13 03:55:35.851997 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 03:55:35.852008 kernel: GPT:17805311 != 41943039 Dec 13 03:55:35.852019 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 03:55:35.852029 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:55:35.866374 kernel: libata version 3.00 loaded. Dec 13 03:55:35.873370 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 03:55:35.896717 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (435) Dec 13 03:55:35.896740 kernel: scsi host0: ata_piix Dec 13 03:55:35.896886 kernel: scsi host1: ata_piix Dec 13 03:55:35.897005 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 03:55:35.897020 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 03:55:35.893078 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 03:55:35.934871 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 03:55:35.935485 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 03:55:35.941504 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 03:55:35.945614 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:55:35.946969 systemd[1]: Starting disk-uuid.service... Dec 13 03:55:35.958571 disk-uuid[462]: Primary Header is updated. Dec 13 03:55:35.958571 disk-uuid[462]: Secondary Entries is updated. Dec 13 03:55:35.958571 disk-uuid[462]: Secondary Header is updated. Dec 13 03:55:35.969409 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:55:35.973381 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:55:36.995405 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:55:36.996028 disk-uuid[463]: The operation has completed successfully. Dec 13 03:55:37.062981 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 03:55:37.064692 systemd[1]: Finished disk-uuid.service. Dec 13 03:55:37.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:37.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:37.085500 systemd[1]: Starting verity-setup.service... Dec 13 03:55:37.127438 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 03:55:37.649409 systemd[1]: Found device dev-mapper-usr.device. Dec 13 03:55:37.651500 systemd[1]: Finished verity-setup.service. Dec 13 03:55:37.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:37.654214 systemd[1]: Mounting sysusr-usr.mount... Dec 13 03:55:37.799444 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 03:55:37.801272 systemd[1]: Mounted sysusr-usr.mount. Dec 13 03:55:37.803577 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 03:55:37.805784 systemd[1]: Starting ignition-setup.service... Dec 13 03:55:37.809223 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 03:55:37.823241 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:55:37.823285 kernel: BTRFS info (device vda6): using free space tree Dec 13 03:55:37.823297 kernel: BTRFS info (device vda6): has skinny extents Dec 13 03:55:37.852978 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 03:55:37.872113 systemd[1]: Finished ignition-setup.service. Dec 13 03:55:37.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:37.875187 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 03:55:37.978962 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 03:55:37.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:37.980000 audit: BPF prog-id=9 op=LOAD Dec 13 03:55:37.981566 systemd[1]: Starting systemd-networkd.service... Dec 13 03:55:38.005529 systemd-networkd[633]: lo: Link UP Dec 13 03:55:38.006338 systemd-networkd[633]: lo: Gained carrier Dec 13 03:55:38.007465 systemd-networkd[633]: Enumeration completed Dec 13 03:55:38.008063 systemd[1]: Started systemd-networkd.service. Dec 13 03:55:38.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.008545 systemd-networkd[633]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:55:38.009208 systemd[1]: Reached target network.target. Dec 13 03:55:38.011294 systemd-networkd[633]: eth0: Link UP Dec 13 03:55:38.011298 systemd-networkd[633]: eth0: Gained carrier Dec 13 03:55:38.012833 systemd[1]: Starting iscsiuio.service... Dec 13 03:55:38.031437 systemd[1]: Started iscsiuio.service. Dec 13 03:55:38.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.033436 systemd-networkd[633]: eth0: DHCPv4 address 172.24.4.138/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 03:55:38.035943 systemd[1]: Starting iscsid.service... Dec 13 03:55:38.036881 iscsid[642]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:55:38.036881 iscsid[642]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 03:55:38.036881 iscsid[642]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 03:55:38.036881 iscsid[642]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 03:55:38.036881 iscsid[642]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:55:38.036881 iscsid[642]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 03:55:38.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.040182 systemd[1]: Started iscsid.service. Dec 13 03:55:38.043644 systemd[1]: Starting dracut-initqueue.service... Dec 13 03:55:38.057164 systemd[1]: Finished dracut-initqueue.service. Dec 13 03:55:38.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.058512 systemd[1]: Reached target remote-fs-pre.target. Dec 13 03:55:38.059607 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:55:38.060068 systemd[1]: Reached target remote-fs.target. Dec 13 03:55:38.062463 systemd[1]: Starting dracut-pre-mount.service... Dec 13 03:55:38.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.071922 systemd[1]: Finished dracut-pre-mount.service. Dec 13 03:55:38.345139 ignition[553]: Ignition 2.14.0 Dec 13 03:55:38.346268 ignition[553]: Stage: fetch-offline Dec 13 03:55:38.346460 ignition[553]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:38.346509 ignition[553]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:38.351843 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 03:55:38.348708 ignition[553]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:38.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.348931 ignition[553]: parsed url from cmdline: "" Dec 13 03:55:38.355048 systemd[1]: Starting ignition-fetch.service... Dec 13 03:55:38.348940 ignition[553]: no config URL provided Dec 13 03:55:38.348952 ignition[553]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:55:38.348971 ignition[553]: no config at "/usr/lib/ignition/user.ign" Dec 13 03:55:38.348989 ignition[553]: failed to fetch config: resource requires networking Dec 13 03:55:38.349544 ignition[553]: Ignition finished successfully Dec 13 03:55:38.372767 ignition[656]: Ignition 2.14.0 Dec 13 03:55:38.372795 ignition[656]: Stage: fetch Dec 13 03:55:38.373014 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:38.373052 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:38.375249 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:38.375495 ignition[656]: parsed url from cmdline: "" Dec 13 03:55:38.375505 ignition[656]: no config URL provided Dec 13 03:55:38.375517 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:55:38.375535 ignition[656]: no config at "/usr/lib/ignition/user.ign" Dec 13 03:55:38.377896 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 03:55:38.377939 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 03:55:38.378198 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 03:55:38.735383 ignition[656]: GET result: OK Dec 13 03:55:38.735512 ignition[656]: parsing config with SHA512: c1adb580c0c31b0c8fa2c2d6f68b36e2f755449c999165e52f393e634292ca81a8c09621c5a6699ecb406ecae9c52e147128705ca949524ba0b074bd3ff8b3e1 Dec 13 03:55:38.745624 unknown[656]: fetched base config from "system" Dec 13 03:55:38.747811 unknown[656]: fetched base config from "system" Dec 13 03:55:38.747845 unknown[656]: fetched user config from "openstack" Dec 13 03:55:38.748548 ignition[656]: fetch: fetch complete Dec 13 03:55:38.748560 ignition[656]: fetch: fetch passed Dec 13 03:55:38.748725 ignition[656]: Ignition finished successfully Dec 13 03:55:38.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.753795 systemd[1]: Finished ignition-fetch.service. Dec 13 03:55:38.756784 systemd[1]: Starting ignition-kargs.service... Dec 13 03:55:38.777881 ignition[662]: Ignition 2.14.0 Dec 13 03:55:38.779458 ignition[662]: Stage: kargs Dec 13 03:55:38.780761 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:38.782429 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:38.784723 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:38.791645 ignition[662]: kargs: kargs passed Dec 13 03:55:38.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.794776 systemd[1]: Finished ignition-kargs.service. Dec 13 03:55:38.791744 ignition[662]: Ignition finished successfully Dec 13 03:55:38.797772 systemd[1]: Starting ignition-disks.service... Dec 13 03:55:38.813730 ignition[667]: Ignition 2.14.0 Dec 13 03:55:38.813757 ignition[667]: Stage: disks Dec 13 03:55:38.813984 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:38.814024 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:38.816234 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:38.818200 ignition[667]: disks: disks passed Dec 13 03:55:38.819871 systemd[1]: Finished ignition-disks.service. Dec 13 03:55:38.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:38.818289 ignition[667]: Ignition finished successfully Dec 13 03:55:38.821963 systemd[1]: Reached target initrd-root-device.target. Dec 13 03:55:38.823973 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:55:38.826168 systemd[1]: Reached target local-fs.target. Dec 13 03:55:38.828324 systemd[1]: Reached target sysinit.target. Dec 13 03:55:38.830459 systemd[1]: Reached target basic.target. Dec 13 03:55:38.834303 systemd[1]: Starting systemd-fsck-root.service... Dec 13 03:55:38.985889 systemd-fsck[675]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 03:55:39.012991 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 03:55:39.013115 kernel: audit: type=1130 audit(1734062139.004:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.003864 systemd[1]: Finished systemd-fsck-root.service. Dec 13 03:55:39.006921 systemd[1]: Mounting sysroot.mount... Dec 13 03:55:39.023964 systemd-networkd[633]: eth0: Gained IPv6LL Dec 13 03:55:39.035424 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 03:55:39.038217 systemd[1]: Mounted sysroot.mount. Dec 13 03:55:39.040214 systemd[1]: Reached target initrd-root-fs.target. Dec 13 03:55:39.048519 systemd[1]: Mounting sysroot-usr.mount... Dec 13 03:55:39.050688 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 03:55:39.052213 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 03:55:39.057338 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 03:55:39.057485 systemd[1]: Reached target ignition-diskful.target. Dec 13 03:55:39.065243 systemd[1]: Mounted sysroot-usr.mount. Dec 13 03:55:39.076023 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:55:39.078984 systemd[1]: Starting initrd-setup-root.service... Dec 13 03:55:39.093499 initrd-setup-root[687]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 03:55:39.119382 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (682) Dec 13 03:55:39.120971 initrd-setup-root[695]: cut: /sysroot/etc/group: No such file or directory Dec 13 03:55:39.128770 initrd-setup-root[703]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 03:55:39.133705 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:55:39.133730 kernel: BTRFS info (device vda6): using free space tree Dec 13 03:55:39.133742 kernel: BTRFS info (device vda6): has skinny extents Dec 13 03:55:39.134876 initrd-setup-root[714]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 03:55:39.162491 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:55:39.242846 systemd[1]: Finished initrd-setup-root.service. Dec 13 03:55:39.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.245809 systemd[1]: Starting ignition-mount.service... Dec 13 03:55:39.259229 kernel: audit: type=1130 audit(1734062139.243:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.256654 systemd[1]: Starting sysroot-boot.service... Dec 13 03:55:39.270305 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 03:55:39.270544 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 03:55:39.301488 ignition[749]: INFO : Ignition 2.14.0 Dec 13 03:55:39.301488 ignition[749]: INFO : Stage: mount Dec 13 03:55:39.302753 ignition[749]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:39.302753 ignition[749]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:39.304551 ignition[749]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:39.305686 ignition[749]: INFO : mount: mount passed Dec 13 03:55:39.306819 ignition[749]: INFO : Ignition finished successfully Dec 13 03:55:39.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.307722 systemd[1]: Finished ignition-mount.service. Dec 13 03:55:39.313376 kernel: audit: type=1130 audit(1734062139.307:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.324988 systemd[1]: Finished sysroot-boot.service. Dec 13 03:55:39.330383 kernel: audit: type=1130 audit(1734062139.325:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.345642 coreos-metadata[681]: Dec 13 03:55:39.345 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 03:55:39.366461 coreos-metadata[681]: Dec 13 03:55:39.366 INFO Fetch successful Dec 13 03:55:39.367197 coreos-metadata[681]: Dec 13 03:55:39.367 INFO wrote hostname ci-3510-3-6-d-23e59c2800.novalocal to /sysroot/etc/hostname Dec 13 03:55:39.371791 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 03:55:39.371963 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 03:55:39.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.374407 systemd[1]: Starting ignition-files.service... Dec 13 03:55:39.383077 kernel: audit: type=1130 audit(1734062139.372:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.383103 kernel: audit: type=1131 audit(1734062139.372:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:39.387076 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:55:39.410406 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (758) Dec 13 03:55:39.416456 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:55:39.416592 kernel: BTRFS info (device vda6): using free space tree Dec 13 03:55:39.416636 kernel: BTRFS info (device vda6): has skinny extents Dec 13 03:55:39.431757 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:55:39.457272 ignition[777]: INFO : Ignition 2.14.0 Dec 13 03:55:39.457272 ignition[777]: INFO : Stage: files Dec 13 03:55:39.459968 ignition[777]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:39.459968 ignition[777]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:39.459968 ignition[777]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:39.467242 ignition[777]: DEBUG : files: compiled without relabeling support, skipping Dec 13 03:55:39.467242 ignition[777]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 03:55:39.467242 ignition[777]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 03:55:39.475086 ignition[777]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 03:55:39.475086 ignition[777]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 03:55:39.475086 ignition[777]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 03:55:39.474255 unknown[777]: wrote ssh authorized keys file for user: core Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 03:55:39.484890 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 03:55:39.899580 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 03:55:41.682845 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 03:55:41.682845 ignition[777]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:55:41.682845 ignition[777]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:55:41.682845 ignition[777]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:55:41.692972 ignition[777]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:55:41.692972 ignition[777]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:55:41.692972 ignition[777]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:55:41.692972 ignition[777]: INFO : files: files passed Dec 13 03:55:41.692972 ignition[777]: INFO : Ignition finished successfully Dec 13 03:55:41.711161 kernel: audit: type=1130 audit(1734062141.694:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.692334 systemd[1]: Finished ignition-files.service. Dec 13 03:55:41.695418 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 03:55:41.710551 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 03:55:41.712596 systemd[1]: Starting ignition-quench.service... Dec 13 03:55:41.720030 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 03:55:41.720264 systemd[1]: Finished ignition-quench.service. Dec 13 03:55:41.734724 kernel: audit: type=1130 audit(1734062141.721:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.734762 kernel: audit: type=1131 audit(1734062141.721:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.734859 initrd-setup-root-after-ignition[802]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 03:55:41.748732 kernel: audit: type=1130 audit(1734062141.735:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.735197 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 03:55:41.735851 systemd[1]: Reached target ignition-complete.target. Dec 13 03:55:41.746889 systemd[1]: Starting initrd-parse-etc.service... Dec 13 03:55:41.771230 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 03:55:41.771385 systemd[1]: Finished initrd-parse-etc.service. Dec 13 03:55:41.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.773337 systemd[1]: Reached target initrd-fs.target. Dec 13 03:55:41.774894 systemd[1]: Reached target initrd.target. Dec 13 03:55:41.776588 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 03:55:41.777515 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 03:55:41.798121 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 03:55:41.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.800411 systemd[1]: Starting initrd-cleanup.service... Dec 13 03:55:41.811304 systemd[1]: Stopped target nss-lookup.target. Dec 13 03:55:41.812640 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 03:55:41.813826 systemd[1]: Stopped target timers.target. Dec 13 03:55:41.815124 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 03:55:41.815282 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 03:55:41.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.816481 systemd[1]: Stopped target initrd.target. Dec 13 03:55:41.817282 systemd[1]: Stopped target basic.target. Dec 13 03:55:41.818174 systemd[1]: Stopped target ignition-complete.target. Dec 13 03:55:41.819119 systemd[1]: Stopped target ignition-diskful.target. Dec 13 03:55:41.820104 systemd[1]: Stopped target initrd-root-device.target. Dec 13 03:55:41.821043 systemd[1]: Stopped target remote-fs.target. Dec 13 03:55:41.821926 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 03:55:41.822847 systemd[1]: Stopped target sysinit.target. Dec 13 03:55:41.823745 systemd[1]: Stopped target local-fs.target. Dec 13 03:55:41.824658 systemd[1]: Stopped target local-fs-pre.target. Dec 13 03:55:41.825632 systemd[1]: Stopped target swap.target. Dec 13 03:55:41.826455 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 03:55:41.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.826627 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 03:55:41.827519 systemd[1]: Stopped target cryptsetup.target. Dec 13 03:55:41.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.828284 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 03:55:41.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.828462 systemd[1]: Stopped dracut-initqueue.service. Dec 13 03:55:41.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.829294 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 03:55:41.829476 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 03:55:41.830238 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 03:55:41.830425 systemd[1]: Stopped ignition-files.service. Dec 13 03:55:41.832093 systemd[1]: Stopping ignition-mount.service... Dec 13 03:55:41.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.833848 systemd[1]: Stopping iscsiuio.service... Dec 13 03:55:41.839730 systemd[1]: Stopping sysroot-boot.service... Dec 13 03:55:41.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.840199 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 03:55:41.840439 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 03:55:41.841073 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 03:55:41.841203 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 03:55:41.843315 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 03:55:41.843485 systemd[1]: Stopped iscsiuio.service. Dec 13 03:55:41.847095 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 03:55:41.847439 systemd[1]: Finished initrd-cleanup.service. Dec 13 03:55:41.858307 ignition[815]: INFO : Ignition 2.14.0 Dec 13 03:55:41.858307 ignition[815]: INFO : Stage: umount Dec 13 03:55:41.858307 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:55:41.858307 ignition[815]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:55:41.858307 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:55:41.858307 ignition[815]: INFO : umount: umount passed Dec 13 03:55:41.858307 ignition[815]: INFO : Ignition finished successfully Dec 13 03:55:41.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.860248 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 03:55:41.860376 systemd[1]: Stopped ignition-mount.service. Dec 13 03:55:41.863545 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 03:55:41.863877 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 03:55:41.863917 systemd[1]: Stopped ignition-disks.service. Dec 13 03:55:41.864433 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 03:55:41.864473 systemd[1]: Stopped ignition-kargs.service. Dec 13 03:55:41.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.864932 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 03:55:41.864967 systemd[1]: Stopped ignition-fetch.service. Dec 13 03:55:41.865488 systemd[1]: Stopped target network.target. Dec 13 03:55:41.865908 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 03:55:41.865949 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 03:55:41.866507 systemd[1]: Stopped target paths.target. Dec 13 03:55:41.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.866923 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 03:55:41.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.868859 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 03:55:41.869324 systemd[1]: Stopped target slices.target. Dec 13 03:55:41.869788 systemd[1]: Stopped target sockets.target. Dec 13 03:55:41.870256 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 03:55:41.870286 systemd[1]: Closed iscsid.socket. Dec 13 03:55:41.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.870740 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 03:55:41.870782 systemd[1]: Closed iscsiuio.socket. Dec 13 03:55:41.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.871725 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 03:55:41.903000 audit: BPF prog-id=6 op=UNLOAD Dec 13 03:55:41.871768 systemd[1]: Stopped ignition-setup.service. Dec 13 03:55:41.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.872903 systemd[1]: Stopping systemd-networkd.service... Dec 13 03:55:41.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.874292 systemd[1]: Stopping systemd-resolved.service... Dec 13 03:55:41.876419 systemd-networkd[633]: eth0: DHCPv6 lease lost Dec 13 03:55:41.909000 audit: BPF prog-id=9 op=UNLOAD Dec 13 03:55:41.877531 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 03:55:41.877640 systemd[1]: Stopped systemd-networkd.service. Dec 13 03:55:41.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.880928 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 03:55:41.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.880973 systemd[1]: Closed systemd-networkd.socket. Dec 13 03:55:41.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.882675 systemd[1]: Stopping network-cleanup.service... Dec 13 03:55:41.885573 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 03:55:41.885644 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 03:55:41.886673 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 03:55:41.886717 systemd[1]: Stopped systemd-sysctl.service. Dec 13 03:55:41.888063 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 03:55:41.888103 systemd[1]: Stopped systemd-modules-load.service. Dec 13 03:55:41.895307 systemd[1]: Stopping systemd-udevd.service... Dec 13 03:55:41.900071 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 03:55:41.900582 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 03:55:41.900679 systemd[1]: Stopped systemd-resolved.service. Dec 13 03:55:41.905688 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 03:55:41.905788 systemd[1]: Stopped network-cleanup.service. Dec 13 03:55:41.906770 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 03:55:41.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.906927 systemd[1]: Stopped systemd-udevd.service. Dec 13 03:55:41.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.909086 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 03:55:41.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.909126 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 03:55:41.910296 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 03:55:41.910330 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 03:55:41.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:41.911336 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 03:55:41.911465 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 03:55:41.912720 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 03:55:41.912781 systemd[1]: Stopped dracut-cmdline.service. Dec 13 03:55:41.913599 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 03:55:41.913637 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 03:55:41.915585 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 03:55:41.923593 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 03:55:41.923689 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 03:55:41.924996 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 03:55:41.925046 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 03:55:41.925797 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 03:55:41.925841 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 03:55:41.928207 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 03:55:41.928934 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 03:55:41.929048 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 03:55:42.384617 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 03:55:42.384907 systemd[1]: Stopped sysroot-boot.service. Dec 13 03:55:42.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:42.387724 systemd[1]: Reached target initrd-switch-root.target. Dec 13 03:55:42.389629 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 03:55:42.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:42.389732 systemd[1]: Stopped initrd-setup-root.service. Dec 13 03:55:42.393477 systemd[1]: Starting initrd-switch-root.service... Dec 13 03:55:42.437740 systemd[1]: Switching root. Dec 13 03:55:42.473098 iscsid[642]: iscsid shutting down. Dec 13 03:55:42.474458 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Dec 13 03:55:42.474574 systemd-journald[184]: Journal stopped Dec 13 03:55:46.785616 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 03:55:46.785696 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 03:55:46.785710 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 03:55:46.785722 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 03:55:46.785734 kernel: SELinux: policy capability open_perms=1 Dec 13 03:55:46.785746 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 03:55:46.785758 kernel: SELinux: policy capability always_check_network=0 Dec 13 03:55:46.785775 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 03:55:46.785786 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 03:55:46.785797 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 03:55:46.785810 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 03:55:46.785832 systemd[1]: Successfully loaded SELinux policy in 94.644ms. Dec 13 03:55:46.785856 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.559ms. Dec 13 03:55:46.785871 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:55:46.785885 systemd[1]: Detected virtualization kvm. Dec 13 03:55:46.785897 systemd[1]: Detected architecture x86-64. Dec 13 03:55:46.785910 systemd[1]: Detected first boot. Dec 13 03:55:46.785923 systemd[1]: Hostname set to . Dec 13 03:55:46.785937 systemd[1]: Initializing machine ID from VM UUID. Dec 13 03:55:46.785950 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 03:55:46.785962 systemd[1]: Populated /etc with preset unit settings. Dec 13 03:55:46.785975 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:55:46.785995 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:55:46.786009 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:55:46.786022 kernel: kauditd_printk_skb: 54 callbacks suppressed Dec 13 03:55:46.786035 kernel: audit: type=1334 audit(1734062146.525:88): prog-id=12 op=LOAD Dec 13 03:55:46.786047 kernel: audit: type=1334 audit(1734062146.525:89): prog-id=3 op=UNLOAD Dec 13 03:55:46.786120 kernel: audit: type=1334 audit(1734062146.528:90): prog-id=13 op=LOAD Dec 13 03:55:46.786133 kernel: audit: type=1334 audit(1734062146.531:91): prog-id=14 op=LOAD Dec 13 03:55:46.786144 kernel: audit: type=1334 audit(1734062146.531:92): prog-id=4 op=UNLOAD Dec 13 03:55:46.786155 kernel: audit: type=1334 audit(1734062146.531:93): prog-id=5 op=UNLOAD Dec 13 03:55:46.786167 kernel: audit: type=1334 audit(1734062146.534:94): prog-id=15 op=LOAD Dec 13 03:55:46.786181 kernel: audit: type=1334 audit(1734062146.534:95): prog-id=12 op=UNLOAD Dec 13 03:55:46.786193 kernel: audit: type=1334 audit(1734062146.537:96): prog-id=16 op=LOAD Dec 13 03:55:46.786205 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 03:55:46.786217 kernel: audit: type=1334 audit(1734062146.540:97): prog-id=17 op=LOAD Dec 13 03:55:46.786229 systemd[1]: Stopped iscsid.service. Dec 13 03:55:46.786242 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 03:55:46.786254 systemd[1]: Stopped initrd-switch-root.service. Dec 13 03:55:46.786268 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 03:55:46.786284 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 03:55:46.786298 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 03:55:46.786310 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 03:55:46.786323 systemd[1]: Created slice system-getty.slice. Dec 13 03:55:46.786337 systemd[1]: Created slice system-modprobe.slice. Dec 13 03:55:46.786368 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 03:55:46.786385 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 03:55:46.786398 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 03:55:46.786411 systemd[1]: Created slice user.slice. Dec 13 03:55:46.786423 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:55:46.786436 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 03:55:46.786449 systemd[1]: Set up automount boot.automount. Dec 13 03:55:46.786461 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 03:55:46.786475 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 03:55:46.786488 systemd[1]: Stopped target initrd-fs.target. Dec 13 03:55:46.786500 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 03:55:46.786513 systemd[1]: Reached target integritysetup.target. Dec 13 03:55:46.786525 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:55:46.786538 systemd[1]: Reached target remote-fs.target. Dec 13 03:55:46.786550 systemd[1]: Reached target slices.target. Dec 13 03:55:46.786564 systemd[1]: Reached target swap.target. Dec 13 03:55:46.786578 systemd[1]: Reached target torcx.target. Dec 13 03:55:46.786592 systemd[1]: Reached target veritysetup.target. Dec 13 03:55:46.786605 systemd[1]: Listening on systemd-coredump.socket. Dec 13 03:55:46.786619 systemd[1]: Listening on systemd-initctl.socket. Dec 13 03:55:46.787611 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:55:46.787650 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:55:46.787666 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:55:46.787678 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 03:55:46.787691 systemd[1]: Mounting dev-hugepages.mount... Dec 13 03:55:46.787704 systemd[1]: Mounting dev-mqueue.mount... Dec 13 03:55:46.787720 systemd[1]: Mounting media.mount... Dec 13 03:55:46.787735 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:46.787748 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 03:55:46.787761 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 03:55:46.787774 systemd[1]: Mounting tmp.mount... Dec 13 03:55:46.787786 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 03:55:46.787799 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:55:46.787812 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:55:46.787824 systemd[1]: Starting modprobe@configfs.service... Dec 13 03:55:46.787836 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:55:46.787851 systemd[1]: Starting modprobe@drm.service... Dec 13 03:55:46.787864 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:55:46.787876 systemd[1]: Starting modprobe@fuse.service... Dec 13 03:55:46.787983 systemd[1]: Starting modprobe@loop.service... Dec 13 03:55:46.787998 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 03:55:46.788011 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 03:55:46.788023 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 03:55:46.788035 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 03:55:46.788049 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 03:55:46.788061 systemd[1]: Stopped systemd-journald.service. Dec 13 03:55:46.788073 systemd[1]: Starting systemd-journald.service... Dec 13 03:55:46.788085 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:55:46.788098 systemd[1]: Starting systemd-network-generator.service... Dec 13 03:55:46.788110 systemd[1]: Starting systemd-remount-fs.service... Dec 13 03:55:46.788121 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:55:46.788133 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 03:55:46.788145 systemd[1]: Stopped verity-setup.service. Dec 13 03:55:46.788157 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:46.788175 systemd[1]: Mounted dev-hugepages.mount. Dec 13 03:55:46.788188 systemd[1]: Mounted dev-mqueue.mount. Dec 13 03:55:46.788200 systemd[1]: Mounted media.mount. Dec 13 03:55:46.788211 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 03:55:46.788223 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 03:55:46.788235 systemd[1]: Mounted tmp.mount. Dec 13 03:55:46.788246 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:55:46.788258 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:55:46.788270 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:55:46.788283 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:55:46.788296 systemd[1]: Finished modprobe@drm.service. Dec 13 03:55:46.788308 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 03:55:46.788320 systemd[1]: Finished modprobe@configfs.service. Dec 13 03:55:46.788331 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:55:46.788361 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:55:46.788374 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:55:46.788386 systemd[1]: Finished systemd-network-generator.service. Dec 13 03:55:46.788398 systemd[1]: Finished systemd-remount-fs.service. Dec 13 03:55:46.788410 kernel: fuse: init (API version 7.34) Dec 13 03:55:46.788424 systemd[1]: Reached target network-pre.target. Dec 13 03:55:46.788436 kernel: loop: module loaded Dec 13 03:55:46.788449 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 03:55:46.788461 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 03:55:46.788477 systemd-journald[914]: Journal started Dec 13 03:55:46.788529 systemd-journald[914]: Runtime Journal (/run/log/journal/6a465f57f8824c6cb55ad0fcf65ee5ed) is 4.9M, max 39.5M, 34.5M free. Dec 13 03:55:42.884000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 03:55:43.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:55:43.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:55:43.051000 audit: BPF prog-id=10 op=LOAD Dec 13 03:55:43.051000 audit: BPF prog-id=10 op=UNLOAD Dec 13 03:55:43.051000 audit: BPF prog-id=11 op=LOAD Dec 13 03:55:43.051000 audit: BPF prog-id=11 op=UNLOAD Dec 13 03:55:43.248000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 03:55:43.248000 audit[849]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:55:43.248000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:55:43.250000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 03:55:43.250000 audit[849]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:55:43.250000 audit: CWD cwd="/" Dec 13 03:55:43.250000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:43.250000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:43.250000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:55:46.525000 audit: BPF prog-id=12 op=LOAD Dec 13 03:55:46.525000 audit: BPF prog-id=3 op=UNLOAD Dec 13 03:55:46.528000 audit: BPF prog-id=13 op=LOAD Dec 13 03:55:46.531000 audit: BPF prog-id=14 op=LOAD Dec 13 03:55:46.531000 audit: BPF prog-id=4 op=UNLOAD Dec 13 03:55:46.531000 audit: BPF prog-id=5 op=UNLOAD Dec 13 03:55:46.534000 audit: BPF prog-id=15 op=LOAD Dec 13 03:55:46.534000 audit: BPF prog-id=12 op=UNLOAD Dec 13 03:55:46.537000 audit: BPF prog-id=16 op=LOAD Dec 13 03:55:46.540000 audit: BPF prog-id=17 op=LOAD Dec 13 03:55:46.540000 audit: BPF prog-id=13 op=UNLOAD Dec 13 03:55:46.540000 audit: BPF prog-id=14 op=UNLOAD Dec 13 03:55:46.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.562000 audit: BPF prog-id=15 op=UNLOAD Dec 13 03:55:46.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.798614 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 03:55:46.798653 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:55:46.798682 systemd[1]: Starting systemd-random-seed.service... Dec 13 03:55:46.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.691000 audit: BPF prog-id=18 op=LOAD Dec 13 03:55:46.691000 audit: BPF prog-id=19 op=LOAD Dec 13 03:55:46.691000 audit: BPF prog-id=20 op=LOAD Dec 13 03:55:46.691000 audit: BPF prog-id=16 op=UNLOAD Dec 13 03:55:46.691000 audit: BPF prog-id=17 op=UNLOAD Dec 13 03:55:46.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.776000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 03:55:46.776000 audit[914]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe67efb100 a2=4000 a3=7ffe67efb19c items=0 ppid=1 pid=914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:55:46.776000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 03:55:46.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:43.243699 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:55:46.524179 systemd[1]: Queued start job for default target multi-user.target. Dec 13 03:55:43.244540 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:55:46.524192 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 03:55:43.244565 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:55:46.542074 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 03:55:43.244631 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 03:55:43.244645 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 03:55:43.244686 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 03:55:43.244703 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 03:55:43.244946 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 03:55:43.244994 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:55:43.245010 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:55:43.247113 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 03:55:43.247164 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 03:55:43.247190 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 03:55:43.247209 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 03:55:43.247233 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 03:55:43.247250 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 03:55:46.117871 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:46Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:55:46.118229 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:46Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:55:46.803693 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:55:46.118372 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:46Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:55:46.118734 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:46Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:55:46.119559 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:46Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 03:55:46.119770 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:55:46Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 03:55:46.807490 systemd[1]: Started systemd-journald.service. Dec 13 03:55:46.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.808171 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 03:55:46.808331 systemd[1]: Finished modprobe@fuse.service. Dec 13 03:55:46.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.809004 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:55:46.809137 systemd[1]: Finished modprobe@loop.service. Dec 13 03:55:46.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.810562 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 03:55:46.814679 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 03:55:46.822628 systemd[1]: Starting systemd-journal-flush.service... Dec 13 03:55:46.823209 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:55:46.824660 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 03:55:46.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.831763 systemd[1]: Finished systemd-random-seed.service. Dec 13 03:55:46.832374 systemd[1]: Reached target first-boot-complete.target. Dec 13 03:55:46.834070 systemd-journald[914]: Time spent on flushing to /var/log/journal/6a465f57f8824c6cb55ad0fcf65ee5ed is 43.494ms for 1092 entries. Dec 13 03:55:46.834070 systemd-journald[914]: System Journal (/var/log/journal/6a465f57f8824c6cb55ad0fcf65ee5ed) is 8.0M, max 584.8M, 576.8M free. Dec 13 03:55:46.895829 systemd-journald[914]: Received client request to flush runtime journal. Dec 13 03:55:46.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.839841 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:55:46.897850 systemd[1]: Finished systemd-journal-flush.service. Dec 13 03:55:46.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.900066 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:55:46.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.901826 systemd[1]: Starting systemd-udev-settle.service... Dec 13 03:55:46.913561 udevadm[956]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 03:55:46.916119 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 03:55:46.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:46.917931 systemd[1]: Starting systemd-sysusers.service... Dec 13 03:55:47.715204 systemd[1]: Finished systemd-sysusers.service. Dec 13 03:55:47.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:47.718989 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:55:47.785665 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:55:47.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.234251 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 03:55:48.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.236000 audit: BPF prog-id=21 op=LOAD Dec 13 03:55:48.237000 audit: BPF prog-id=22 op=LOAD Dec 13 03:55:48.237000 audit: BPF prog-id=7 op=UNLOAD Dec 13 03:55:48.237000 audit: BPF prog-id=8 op=UNLOAD Dec 13 03:55:48.239469 systemd[1]: Starting systemd-udevd.service... Dec 13 03:55:48.258471 systemd-udevd[961]: Using default interface naming scheme 'v252'. Dec 13 03:55:48.297448 systemd[1]: Started systemd-udevd.service. Dec 13 03:55:48.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.304000 audit: BPF prog-id=23 op=LOAD Dec 13 03:55:48.308151 systemd[1]: Starting systemd-networkd.service... Dec 13 03:55:48.329000 audit: BPF prog-id=24 op=LOAD Dec 13 03:55:48.329000 audit: BPF prog-id=25 op=LOAD Dec 13 03:55:48.330000 audit: BPF prog-id=26 op=LOAD Dec 13 03:55:48.331605 systemd[1]: Starting systemd-userdbd.service... Dec 13 03:55:48.382519 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 03:55:48.394567 systemd[1]: Started systemd-userdbd.service. Dec 13 03:55:48.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.458504 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 03:55:48.459915 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:55:48.467380 kernel: ACPI: button: Power Button [PWRF] Dec 13 03:55:48.489659 systemd-networkd[973]: lo: Link UP Dec 13 03:55:48.489668 systemd-networkd[973]: lo: Gained carrier Dec 13 03:55:48.491067 systemd-networkd[973]: Enumeration completed Dec 13 03:55:48.491172 systemd[1]: Started systemd-networkd.service. Dec 13 03:55:48.491193 systemd-networkd[973]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:55:48.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.489000 audit[965]: AVC avc: denied { confidentiality } for pid=965 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:55:48.493057 systemd-networkd[973]: eth0: Link UP Dec 13 03:55:48.493063 systemd-networkd[973]: eth0: Gained carrier Dec 13 03:55:48.506537 systemd-networkd[973]: eth0: DHCPv4 address 172.24.4.138/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 03:55:48.489000 audit[965]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5624d47cc5f0 a1=337fc a2=7f88d70aabc5 a3=5 items=110 ppid=961 pid=965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:55:48.489000 audit: CWD cwd="/" Dec 13 03:55:48.489000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=1 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=2 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=3 name=(null) inode=13659 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=4 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=5 name=(null) inode=13660 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=6 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=7 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=8 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=9 name=(null) inode=13662 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=10 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=11 name=(null) inode=13663 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=12 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=13 name=(null) inode=13664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=14 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=15 name=(null) inode=13665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=16 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=17 name=(null) inode=13666 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=18 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=19 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=20 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=21 name=(null) inode=13668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=22 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=23 name=(null) inode=13669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=24 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=25 name=(null) inode=13670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=26 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=27 name=(null) inode=13671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=28 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=29 name=(null) inode=13672 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=30 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=31 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=32 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=33 name=(null) inode=13674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=34 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=35 name=(null) inode=13675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=36 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=37 name=(null) inode=13676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=38 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=39 name=(null) inode=13677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=40 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=41 name=(null) inode=13678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=42 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=43 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=44 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=45 name=(null) inode=13680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=46 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=47 name=(null) inode=13681 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=48 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=49 name=(null) inode=13682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=50 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=51 name=(null) inode=13683 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=52 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=53 name=(null) inode=13684 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=55 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=56 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=57 name=(null) inode=13686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=58 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=59 name=(null) inode=13687 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=60 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=61 name=(null) inode=13688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=62 name=(null) inode=13688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=63 name=(null) inode=13689 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=64 name=(null) inode=13688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=65 name=(null) inode=13690 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=66 name=(null) inode=13688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=67 name=(null) inode=13691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=68 name=(null) inode=13688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=69 name=(null) inode=13692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=70 name=(null) inode=13688 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=71 name=(null) inode=13693 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=72 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=73 name=(null) inode=13694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=74 name=(null) inode=13694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=75 name=(null) inode=13695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=76 name=(null) inode=13694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=77 name=(null) inode=13696 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=78 name=(null) inode=13694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=79 name=(null) inode=13697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=80 name=(null) inode=13694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=81 name=(null) inode=13698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=82 name=(null) inode=13694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=83 name=(null) inode=13699 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=84 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=85 name=(null) inode=13700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=86 name=(null) inode=13700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=87 name=(null) inode=13701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=88 name=(null) inode=13700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=89 name=(null) inode=13702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=90 name=(null) inode=13700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=91 name=(null) inode=13703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=92 name=(null) inode=13700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=93 name=(null) inode=13704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=94 name=(null) inode=13700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=95 name=(null) inode=13705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=96 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=97 name=(null) inode=13706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=98 name=(null) inode=13706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=99 name=(null) inode=13707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=100 name=(null) inode=13706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=101 name=(null) inode=13708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=102 name=(null) inode=13706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=103 name=(null) inode=13709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=104 name=(null) inode=13706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=105 name=(null) inode=13710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=106 name=(null) inode=13706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=107 name=(null) inode=13711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PATH item=109 name=(null) inode=13712 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:55:48.489000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 03:55:48.522377 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 03:55:48.533372 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 03:55:48.538370 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 03:55:48.572741 systemd[1]: Finished systemd-udev-settle.service. Dec 13 03:55:48.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.574396 systemd[1]: Starting lvm2-activation-early.service... Dec 13 03:55:48.605024 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:55:48.645398 systemd[1]: Finished lvm2-activation-early.service. Dec 13 03:55:48.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.646799 systemd[1]: Reached target cryptsetup.target. Dec 13 03:55:48.650317 systemd[1]: Starting lvm2-activation.service... Dec 13 03:55:48.659214 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:55:48.699626 systemd[1]: Finished lvm2-activation.service. Dec 13 03:55:48.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:48.701036 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:55:48.702163 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 03:55:48.702231 systemd[1]: Reached target local-fs.target. Dec 13 03:55:48.703383 systemd[1]: Reached target machines.target. Dec 13 03:55:48.707043 systemd[1]: Starting ldconfig.service... Dec 13 03:55:48.709496 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:55:48.709596 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:48.711754 systemd[1]: Starting systemd-boot-update.service... Dec 13 03:55:48.724118 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 03:55:48.728542 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 03:55:48.738650 systemd[1]: Starting systemd-sysext.service... Dec 13 03:55:48.748581 systemd[1]: boot.automount: Got automount request for /boot, triggered by 993 (bootctl) Dec 13 03:55:48.751027 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 03:55:48.771383 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 03:55:48.831668 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 03:55:48.832058 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 03:55:48.865458 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 03:55:48.867224 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 03:55:48.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.391338 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 03:55:49.392612 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 03:55:49.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.679473 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 03:55:49.724414 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 03:55:49.773297 (sd-sysext)[1008]: Using extensions 'kubernetes'. Dec 13 03:55:49.776617 (sd-sysext)[1008]: Merged extensions into '/usr'. Dec 13 03:55:49.792079 systemd-fsck[1005]: fsck.fat 4.2 (2021-01-31) Dec 13 03:55:49.792079 systemd-fsck[1005]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 03:55:49.812646 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 03:55:49.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.821613 systemd[1]: Mounting boot.mount... Dec 13 03:55:49.823627 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:49.826676 systemd[1]: Mounting usr-share-oem.mount... Dec 13 03:55:49.831922 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:55:49.834960 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:55:49.836781 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:55:49.838880 systemd[1]: Starting modprobe@loop.service... Dec 13 03:55:49.839770 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:55:49.839894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:49.840032 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:49.842963 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:55:49.843206 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:55:49.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.848740 systemd[1]: Mounted usr-share-oem.mount. Dec 13 03:55:49.850238 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:55:49.850494 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:55:49.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.852163 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:55:49.852400 systemd[1]: Finished modprobe@loop.service. Dec 13 03:55:49.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.854249 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:55:49.854490 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:55:49.856589 systemd[1]: Finished systemd-sysext.service. Dec 13 03:55:49.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:49.859229 systemd[1]: Starting ensure-sysext.service... Dec 13 03:55:49.864716 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 03:55:49.872762 systemd[1]: Reloading. Dec 13 03:55:49.888043 systemd-tmpfiles[1016]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 03:55:49.892408 systemd-tmpfiles[1016]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 03:55:49.895178 systemd-tmpfiles[1016]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 03:55:49.948928 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T03:55:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:55:49.949244 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T03:55:49Z" level=info msg="torcx already run" Dec 13 03:55:50.062226 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:55:50.062457 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:55:50.099089 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:55:50.163000 audit: BPF prog-id=27 op=LOAD Dec 13 03:55:50.163000 audit: BPF prog-id=18 op=UNLOAD Dec 13 03:55:50.164000 audit: BPF prog-id=28 op=LOAD Dec 13 03:55:50.164000 audit: BPF prog-id=29 op=LOAD Dec 13 03:55:50.164000 audit: BPF prog-id=19 op=UNLOAD Dec 13 03:55:50.164000 audit: BPF prog-id=20 op=UNLOAD Dec 13 03:55:50.164000 audit: BPF prog-id=30 op=LOAD Dec 13 03:55:50.164000 audit: BPF prog-id=24 op=UNLOAD Dec 13 03:55:50.165000 audit: BPF prog-id=31 op=LOAD Dec 13 03:55:50.165000 audit: BPF prog-id=32 op=LOAD Dec 13 03:55:50.165000 audit: BPF prog-id=25 op=UNLOAD Dec 13 03:55:50.165000 audit: BPF prog-id=26 op=UNLOAD Dec 13 03:55:50.166000 audit: BPF prog-id=33 op=LOAD Dec 13 03:55:50.166000 audit: BPF prog-id=23 op=UNLOAD Dec 13 03:55:50.169000 audit: BPF prog-id=34 op=LOAD Dec 13 03:55:50.169000 audit: BPF prog-id=35 op=LOAD Dec 13 03:55:50.169000 audit: BPF prog-id=21 op=UNLOAD Dec 13 03:55:50.169000 audit: BPF prog-id=22 op=UNLOAD Dec 13 03:55:50.176014 systemd[1]: Mounted boot.mount. Dec 13 03:55:50.186621 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:50.186865 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.188233 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:55:50.189809 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:55:50.191867 systemd[1]: Starting modprobe@loop.service... Dec 13 03:55:50.192749 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.192885 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:50.193030 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:50.193950 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:55:50.194133 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:55:50.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.195038 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:55:50.195162 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:55:50.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.196931 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:55:50.197083 systemd[1]: Finished modprobe@loop.service. Dec 13 03:55:50.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.198001 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:55:50.198142 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.200173 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:50.200527 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.201932 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:55:50.204314 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:55:50.206544 systemd[1]: Starting modprobe@loop.service... Dec 13 03:55:50.207069 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.207208 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:50.207391 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:50.208316 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:55:50.208505 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:55:50.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.209332 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:55:50.209470 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:55:50.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.210301 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:55:50.210453 systemd[1]: Finished modprobe@loop.service. Dec 13 03:55:50.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.211372 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:55:50.211486 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.214828 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:50.215109 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.216437 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:55:50.219976 systemd[1]: Starting modprobe@drm.service... Dec 13 03:55:50.222310 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:55:50.224886 systemd[1]: Starting modprobe@loop.service... Dec 13 03:55:50.225528 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.225672 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:50.227605 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 03:55:50.228391 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:55:50.229884 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:55:50.230072 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:55:50.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.231116 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:55:50.231264 systemd[1]: Finished modprobe@drm.service. Dec 13 03:55:50.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.232440 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:55:50.232565 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:55:50.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.233821 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:55:50.234023 systemd[1]: Finished modprobe@loop.service. Dec 13 03:55:50.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.235710 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:55:50.235796 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:55:50.236975 systemd[1]: Finished ensure-sysext.service. Dec 13 03:55:50.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.379506 systemd[1]: Finished systemd-boot-update.service. Dec 13 03:55:50.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.471691 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 03:55:50.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.476292 systemd[1]: Starting audit-rules.service... Dec 13 03:55:50.480439 systemd-networkd[973]: eth0: Gained IPv6LL Dec 13 03:55:50.482880 systemd[1]: Starting clean-ca-certificates.service... Dec 13 03:55:50.490423 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 03:55:50.495000 audit: BPF prog-id=36 op=LOAD Dec 13 03:55:50.500200 systemd[1]: Starting systemd-resolved.service... Dec 13 03:55:50.505000 audit: BPF prog-id=37 op=LOAD Dec 13 03:55:50.509857 systemd[1]: Starting systemd-timesyncd.service... Dec 13 03:55:50.517689 systemd[1]: Starting systemd-update-utmp.service... Dec 13 03:55:50.520624 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 03:55:50.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.543440 systemd[1]: Finished clean-ca-certificates.service. Dec 13 03:55:50.544090 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:55:50.550000 audit[1100]: SYSTEM_BOOT pid=1100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.552178 systemd[1]: Finished systemd-update-utmp.service. Dec 13 03:55:50.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:55:50.573992 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 03:55:50.598000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 03:55:50.598000 audit[1114]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6c11d860 a2=420 a3=0 items=0 ppid=1094 pid=1114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:55:50.598000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 03:55:50.599932 augenrules[1114]: No rules Dec 13 03:55:50.601147 systemd[1]: Finished audit-rules.service. Dec 13 03:55:50.614941 systemd[1]: Started systemd-timesyncd.service. Dec 13 03:55:50.615580 systemd[1]: Reached target time-set.target. Dec 13 03:55:51.095062 systemd-timesyncd[1099]: Contacted time server 82.67.126.242:123 (0.flatcar.pool.ntp.org). Dec 13 03:55:51.095530 systemd-timesyncd[1099]: Initial clock synchronization to Fri 2024-12-13 03:55:51.094865 UTC. Dec 13 03:55:51.105577 systemd-resolved[1098]: Positive Trust Anchors: Dec 13 03:55:51.105594 systemd-resolved[1098]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:55:51.105632 systemd-resolved[1098]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:55:51.112715 systemd-resolved[1098]: Using system hostname 'ci-3510-3-6-d-23e59c2800.novalocal'. Dec 13 03:55:51.114079 systemd[1]: Started systemd-resolved.service. Dec 13 03:55:51.114657 systemd[1]: Reached target network.target. Dec 13 03:55:51.115084 systemd[1]: Reached target network-online.target. Dec 13 03:55:51.115549 systemd[1]: Reached target nss-lookup.target. Dec 13 03:55:51.116380 ldconfig[992]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 03:55:51.135161 systemd[1]: Finished ldconfig.service. Dec 13 03:55:51.139231 systemd[1]: Starting systemd-update-done.service... Dec 13 03:55:51.146329 systemd[1]: Finished systemd-update-done.service. Dec 13 03:55:51.147779 systemd[1]: Reached target sysinit.target. Dec 13 03:55:51.149053 systemd[1]: Started motdgen.path. Dec 13 03:55:51.150233 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 03:55:51.152007 systemd[1]: Started logrotate.timer. Dec 13 03:55:51.153244 systemd[1]: Started mdadm.timer. Dec 13 03:55:51.154266 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 03:55:51.155477 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:55:51.155552 systemd[1]: Reached target paths.target. Dec 13 03:55:51.156609 systemd[1]: Reached target timers.target. Dec 13 03:55:51.158714 systemd[1]: Listening on dbus.socket. Dec 13 03:55:51.161914 systemd[1]: Starting docker.socket... Dec 13 03:55:51.169386 systemd[1]: Listening on sshd.socket. Dec 13 03:55:51.170675 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:51.171748 systemd[1]: Listening on docker.socket. Dec 13 03:55:51.173017 systemd[1]: Reached target sockets.target. Dec 13 03:55:51.174097 systemd[1]: Reached target basic.target. Dec 13 03:55:51.175292 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:55:51.175396 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:55:51.177669 systemd[1]: Starting containerd.service... Dec 13 03:55:51.181002 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 03:55:51.184637 systemd[1]: Starting dbus.service... Dec 13 03:55:51.189444 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 03:55:51.194490 systemd[1]: Starting extend-filesystems.service... Dec 13 03:55:51.195115 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 03:55:51.198757 systemd[1]: Starting kubelet.service... Dec 13 03:55:51.210289 jq[1128]: false Dec 13 03:55:51.207814 systemd[1]: Starting motdgen.service... Dec 13 03:55:51.210889 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 03:55:51.213524 systemd[1]: Starting sshd-keygen.service... Dec 13 03:55:51.220157 systemd[1]: Starting systemd-logind.service... Dec 13 03:55:51.220709 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:55:51.220775 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 03:55:51.221215 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 03:55:51.221934 systemd[1]: Starting update-engine.service... Dec 13 03:55:51.223394 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 03:55:51.227783 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 03:55:51.228015 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 03:55:51.234409 jq[1142]: true Dec 13 03:55:51.236010 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 03:55:51.236184 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 03:55:51.268422 extend-filesystems[1129]: Found loop1 Dec 13 03:55:51.270118 jq[1147]: true Dec 13 03:55:51.279814 extend-filesystems[1129]: Found vda Dec 13 03:55:51.280578 extend-filesystems[1129]: Found vda1 Dec 13 03:55:51.282418 extend-filesystems[1129]: Found vda2 Dec 13 03:55:51.284318 extend-filesystems[1129]: Found vda3 Dec 13 03:55:51.284905 extend-filesystems[1129]: Found usr Dec 13 03:55:51.285591 extend-filesystems[1129]: Found vda4 Dec 13 03:55:51.287841 extend-filesystems[1129]: Found vda6 Dec 13 03:55:51.289561 extend-filesystems[1129]: Found vda7 Dec 13 03:55:51.289561 extend-filesystems[1129]: Found vda9 Dec 13 03:55:51.289561 extend-filesystems[1129]: Checking size of /dev/vda9 Dec 13 03:55:51.295010 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 03:55:51.294746 dbus-daemon[1127]: [system] SELinux support is enabled Dec 13 03:55:51.295271 systemd[1]: Finished motdgen.service. Dec 13 03:55:51.297289 systemd[1]: Started dbus.service. Dec 13 03:55:51.300161 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 03:55:51.300190 systemd[1]: Reached target system-config.target. Dec 13 03:55:51.301166 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 03:55:51.301223 systemd[1]: Reached target user-config.target. Dec 13 03:55:51.317787 extend-filesystems[1129]: Resized partition /dev/vda9 Dec 13 03:55:51.327311 extend-filesystems[1170]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 03:55:51.382378 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 03:55:51.389859 env[1148]: time="2024-12-13T03:55:51.389801601Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 03:55:51.400220 systemd-logind[1140]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 03:55:51.400247 systemd-logind[1140]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 03:55:51.400931 systemd-logind[1140]: New seat seat0. Dec 13 03:55:51.402758 systemd[1]: Started systemd-logind.service. Dec 13 03:55:51.445289 env[1148]: time="2024-12-13T03:55:51.445205962Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 03:55:51.450448 systemd[1]: Started update-engine.service. Dec 13 03:55:51.790148 update_engine[1141]: I1213 03:55:51.444790 1141 main.cc:92] Flatcar Update Engine starting Dec 13 03:55:51.790148 update_engine[1141]: I1213 03:55:51.454306 1141 update_check_scheduler.cc:74] Next update check in 2m54s Dec 13 03:55:51.453330 systemd[1]: Started locksmithd.service. Dec 13 03:55:51.793388 env[1148]: time="2024-12-13T03:55:51.791192029Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:55:51.795323 env[1148]: time="2024-12-13T03:55:51.795255510Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:55:51.795585 env[1148]: time="2024-12-13T03:55:51.795544732Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:55:51.796211 env[1148]: time="2024-12-13T03:55:51.796156690Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:55:51.796456 env[1148]: time="2024-12-13T03:55:51.796396059Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 03:55:51.796626 env[1148]: time="2024-12-13T03:55:51.796588310Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 03:55:51.796829 env[1148]: time="2024-12-13T03:55:51.796790950Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 03:55:51.797213 env[1148]: time="2024-12-13T03:55:51.797171143Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:55:51.797953 env[1148]: time="2024-12-13T03:55:51.797911842Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:55:51.799955 env[1148]: time="2024-12-13T03:55:51.799897606Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:55:51.800179 env[1148]: time="2024-12-13T03:55:51.800140622Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 03:55:51.800527 env[1148]: time="2024-12-13T03:55:51.800484427Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 03:55:51.800711 env[1148]: time="2024-12-13T03:55:51.800678631Z" level=info msg="metadata content store policy set" policy=shared Dec 13 03:55:51.847767 sshd_keygen[1158]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 03:55:51.855395 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 03:55:52.876411 bash[1177]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:55:52.876924 extend-filesystems[1170]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 03:55:52.876924 extend-filesystems[1170]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 03:55:52.876924 extend-filesystems[1170]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 03:55:52.876530 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 03:55:52.888851 extend-filesystems[1129]: Resized filesystem in /dev/vda9 Dec 13 03:55:52.879565 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.889767777Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890036161Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890083079Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890274227Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890530077Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890584159Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890623603Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890662105Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890700046Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890738448Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890776559Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.890812637Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 03:55:52.891161 env[1148]: time="2024-12-13T03:55:52.891104344Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 03:55:52.879897 systemd[1]: Finished extend-filesystems.service. Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.891412282Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892236698Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892453294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892502406Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892605760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892647148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892684087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892715867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892747306Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892778805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892809071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892839769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.892877710Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.893222657Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901052 env[1148]: time="2024-12-13T03:55:52.893269675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.897060 systemd[1]: Started containerd.service. Dec 13 03:55:52.901989 env[1148]: time="2024-12-13T03:55:52.893303789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.901989 env[1148]: time="2024-12-13T03:55:52.893336951Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 03:55:52.901989 env[1148]: time="2024-12-13T03:55:52.893427622Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 03:55:52.901989 env[1148]: time="2024-12-13T03:55:52.893465122Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 03:55:52.901989 env[1148]: time="2024-12-13T03:55:52.893505928Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 03:55:52.901989 env[1148]: time="2024-12-13T03:55:52.893587471Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.894083702Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.894238603Z" level=info msg="Connect containerd service" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.894313613Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.895933872Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.896645447Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.896793454Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.897474451Z" level=info msg="Start subscribing containerd event" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.897592362Z" level=info msg="Start recovering state" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.897722326Z" level=info msg="Start event monitor" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.897757412Z" level=info msg="Start snapshots syncer" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.897780876Z" level=info msg="Start cni network conf syncer for default" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.897803769Z" level=info msg="Start streaming server" Dec 13 03:55:52.902335 env[1148]: time="2024-12-13T03:55:52.898818943Z" level=info msg="containerd successfully booted in 1.511977s" Dec 13 03:55:52.962551 systemd[1]: Finished sshd-keygen.service. Dec 13 03:55:52.964704 systemd[1]: Starting issuegen.service... Dec 13 03:55:52.975827 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 03:55:52.976013 systemd[1]: Finished issuegen.service. Dec 13 03:55:52.978036 systemd[1]: Starting systemd-user-sessions.service... Dec 13 03:55:52.990465 systemd[1]: Finished systemd-user-sessions.service. Dec 13 03:55:52.992662 systemd[1]: Started getty@tty1.service. Dec 13 03:55:52.994596 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 03:55:52.995278 systemd[1]: Reached target getty.target. Dec 13 03:55:52.998666 locksmithd[1181]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 03:55:55.397930 systemd[1]: Started kubelet.service. Dec 13 03:55:57.304580 kubelet[1206]: E1213 03:55:57.304474 1206 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:55:57.310907 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:55:57.311512 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:55:57.312317 systemd[1]: kubelet.service: Consumed 2.255s CPU time. Dec 13 03:55:58.352881 coreos-metadata[1124]: Dec 13 03:55:58.352 WARN failed to locate config-drive, using the metadata service API instead Dec 13 03:55:58.437952 coreos-metadata[1124]: Dec 13 03:55:58.437 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 03:55:58.653965 coreos-metadata[1124]: Dec 13 03:55:58.653 INFO Fetch successful Dec 13 03:55:58.653965 coreos-metadata[1124]: Dec 13 03:55:58.653 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 03:55:58.671860 coreos-metadata[1124]: Dec 13 03:55:58.671 INFO Fetch successful Dec 13 03:55:58.758220 unknown[1124]: wrote ssh authorized keys file for user: core Dec 13 03:55:58.790687 update-ssh-keys[1214]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:55:58.792701 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 03:55:58.793755 systemd[1]: Reached target multi-user.target. Dec 13 03:55:58.798175 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 03:55:58.816202 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 03:55:58.816903 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 03:55:58.818094 systemd[1]: Startup finished in 1.000s (kernel) + 7.978s (initrd) + 15.617s (userspace) = 24.596s. Dec 13 03:56:00.042640 systemd[1]: Created slice system-sshd.slice. Dec 13 03:56:00.046969 systemd[1]: Started sshd@0-172.24.4.138:22-172.24.4.1:33926.service. Dec 13 03:56:00.983326 sshd[1217]: Accepted publickey for core from 172.24.4.1 port 33926 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:00.988906 sshd[1217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:01.014128 systemd[1]: Created slice user-500.slice. Dec 13 03:56:01.017835 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 03:56:01.028552 systemd-logind[1140]: New session 1 of user core. Dec 13 03:56:01.048450 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 03:56:01.053613 systemd[1]: Starting user@500.service... Dec 13 03:56:01.058454 (systemd)[1220]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:01.154955 systemd[1220]: Queued start job for default target default.target. Dec 13 03:56:01.156492 systemd[1220]: Reached target paths.target. Dec 13 03:56:01.156514 systemd[1220]: Reached target sockets.target. Dec 13 03:56:01.156530 systemd[1220]: Reached target timers.target. Dec 13 03:56:01.156545 systemd[1220]: Reached target basic.target. Dec 13 03:56:01.156700 systemd[1]: Started user@500.service. Dec 13 03:56:01.157798 systemd[1]: Started session-1.scope. Dec 13 03:56:01.158198 systemd[1220]: Reached target default.target. Dec 13 03:56:01.158453 systemd[1220]: Startup finished in 93ms. Dec 13 03:56:01.670682 systemd[1]: Started sshd@1-172.24.4.138:22-172.24.4.1:33940.service. Dec 13 03:56:03.276873 sshd[1229]: Accepted publickey for core from 172.24.4.1 port 33940 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:03.279025 sshd[1229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:03.285129 systemd-logind[1140]: New session 2 of user core. Dec 13 03:56:03.287511 systemd[1]: Started session-2.scope. Dec 13 03:56:03.930289 systemd[1]: Started sshd@2-172.24.4.138:22-172.24.4.1:33954.service. Dec 13 03:56:03.940625 sshd[1229]: pam_unix(sshd:session): session closed for user core Dec 13 03:56:03.946144 systemd[1]: sshd@1-172.24.4.138:22-172.24.4.1:33940.service: Deactivated successfully. Dec 13 03:56:03.947769 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 03:56:03.950147 systemd-logind[1140]: Session 2 logged out. Waiting for processes to exit. Dec 13 03:56:03.953065 systemd-logind[1140]: Removed session 2. Dec 13 03:56:05.111546 sshd[1234]: Accepted publickey for core from 172.24.4.1 port 33954 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:05.114264 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:05.125128 systemd-logind[1140]: New session 3 of user core. Dec 13 03:56:05.125516 systemd[1]: Started session-3.scope. Dec 13 03:56:05.754475 sshd[1234]: pam_unix(sshd:session): session closed for user core Dec 13 03:56:05.767546 systemd[1]: Started sshd@3-172.24.4.138:22-172.24.4.1:60178.service. Dec 13 03:56:05.769434 systemd[1]: sshd@2-172.24.4.138:22-172.24.4.1:33954.service: Deactivated successfully. Dec 13 03:56:05.774430 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 03:56:05.780515 systemd-logind[1140]: Session 3 logged out. Waiting for processes to exit. Dec 13 03:56:05.784234 systemd-logind[1140]: Removed session 3. Dec 13 03:56:06.973187 sshd[1240]: Accepted publickey for core from 172.24.4.1 port 60178 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:06.976232 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:06.985693 systemd-logind[1140]: New session 4 of user core. Dec 13 03:56:06.986642 systemd[1]: Started session-4.scope. Dec 13 03:56:07.441937 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 03:56:07.442447 systemd[1]: Stopped kubelet.service. Dec 13 03:56:07.442524 systemd[1]: kubelet.service: Consumed 2.255s CPU time. Dec 13 03:56:07.445927 systemd[1]: Starting kubelet.service... Dec 13 03:56:07.587716 sshd[1240]: pam_unix(sshd:session): session closed for user core Dec 13 03:56:07.593958 systemd[1]: sshd@3-172.24.4.138:22-172.24.4.1:60178.service: Deactivated successfully. Dec 13 03:56:07.595327 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 03:56:07.597101 systemd-logind[1140]: Session 4 logged out. Waiting for processes to exit. Dec 13 03:56:07.600016 systemd[1]: Started sshd@4-172.24.4.138:22-172.24.4.1:60182.service. Dec 13 03:56:07.603685 systemd-logind[1140]: Removed session 4. Dec 13 03:56:07.790519 systemd[1]: Started kubelet.service. Dec 13 03:56:08.370874 kubelet[1252]: E1213 03:56:08.370789 1252 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:56:08.378082 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:56:08.378328 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:56:08.927079 sshd[1249]: Accepted publickey for core from 172.24.4.1 port 60182 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:08.932866 sshd[1249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:08.944224 systemd-logind[1140]: New session 5 of user core. Dec 13 03:56:08.944880 systemd[1]: Started session-5.scope. Dec 13 03:56:09.416329 sudo[1261]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 03:56:09.416614 sudo[1261]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:56:09.425629 dbus-daemon[1127]: \xd0M\xc8ECV: received setenforce notice (enforcing=503218464) Dec 13 03:56:09.428207 sudo[1261]: pam_unix(sudo:session): session closed for user root Dec 13 03:56:09.703473 sshd[1249]: pam_unix(sshd:session): session closed for user core Dec 13 03:56:09.716217 systemd[1]: Started sshd@5-172.24.4.138:22-172.24.4.1:60188.service. Dec 13 03:56:09.720937 systemd[1]: sshd@4-172.24.4.138:22-172.24.4.1:60182.service: Deactivated successfully. Dec 13 03:56:09.722828 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 03:56:09.727869 systemd-logind[1140]: Session 5 logged out. Waiting for processes to exit. Dec 13 03:56:09.731427 systemd-logind[1140]: Removed session 5. Dec 13 03:56:11.280144 sshd[1264]: Accepted publickey for core from 172.24.4.1 port 60188 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:11.283879 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:11.294916 systemd-logind[1140]: New session 6 of user core. Dec 13 03:56:11.295757 systemd[1]: Started session-6.scope. Dec 13 03:56:11.928086 sudo[1269]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 03:56:11.929321 sudo[1269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:56:11.935514 sudo[1269]: pam_unix(sudo:session): session closed for user root Dec 13 03:56:11.945813 sudo[1268]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 03:56:11.946428 sudo[1268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:56:11.967703 systemd[1]: Stopping audit-rules.service... Dec 13 03:56:11.970690 kernel: kauditd_printk_skb: 234 callbacks suppressed Dec 13 03:56:11.970754 kernel: audit: type=1305 audit(1734062171.966:215): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:56:11.966000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:56:11.971235 auditctl[1272]: No rules Dec 13 03:56:11.971800 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 03:56:11.972032 systemd[1]: Stopped audit-rules.service. Dec 13 03:56:11.976044 systemd[1]: Starting audit-rules.service... Dec 13 03:56:11.966000 audit[1272]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4412ad40 a2=420 a3=0 items=0 ppid=1 pid=1272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:11.966000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:56:11.984929 kernel: audit: type=1300 audit(1734062171.966:215): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4412ad40 a2=420 a3=0 items=0 ppid=1 pid=1272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:11.985040 kernel: audit: type=1327 audit(1734062171.966:215): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:56:11.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:11.995441 kernel: audit: type=1131 audit(1734062171.969:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.024203 augenrules[1289]: No rules Dec 13 03:56:12.025494 systemd[1]: Finished audit-rules.service. Dec 13 03:56:12.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.028614 sudo[1268]: pam_unix(sudo:session): session closed for user root Dec 13 03:56:12.038422 kernel: audit: type=1130 audit(1734062172.024:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.038551 kernel: audit: type=1106 audit(1734062172.027:218): pid=1268 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.027000 audit[1268]: USER_END pid=1268 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.027000 audit[1268]: CRED_DISP pid=1268 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.059226 kernel: audit: type=1104 audit(1734062172.027:219): pid=1268 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.197561 sshd[1264]: pam_unix(sshd:session): session closed for user core Dec 13 03:56:12.198000 audit[1264]: USER_END pid=1264 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:12.207099 systemd[1]: sshd@5-172.24.4.138:22-172.24.4.1:60188.service: Deactivated successfully. Dec 13 03:56:12.208712 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 03:56:12.216391 kernel: audit: type=1106 audit(1734062172.198:220): pid=1264 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:12.198000 audit[1264]: CRED_DISP pid=1264 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:12.224039 kernel: audit: type=1104 audit(1734062172.198:221): pid=1264 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:12.222871 systemd-logind[1140]: Session 6 logged out. Waiting for processes to exit. Dec 13 03:56:12.224609 systemd[1]: Started sshd@6-172.24.4.138:22-172.24.4.1:60194.service. Dec 13 03:56:12.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.138:22-172.24.4.1:60188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.237034 kernel: audit: type=1131 audit(1734062172.201:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.138:22-172.24.4.1:60188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:12.236278 systemd-logind[1140]: Removed session 6. Dec 13 03:56:12.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.138:22-172.24.4.1:60194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:13.556000 audit[1295]: USER_ACCT pid=1295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:13.558270 sshd[1295]: Accepted publickey for core from 172.24.4.1 port 60194 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:56:13.557000 audit[1295]: CRED_ACQ pid=1295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:13.558000 audit[1295]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0fe33fe0 a2=3 a3=0 items=0 ppid=1 pid=1295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:13.558000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:56:13.559834 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:56:13.567397 systemd-logind[1140]: New session 7 of user core. Dec 13 03:56:13.569319 systemd[1]: Started session-7.scope. Dec 13 03:56:13.574000 audit[1295]: USER_START pid=1295 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:13.576000 audit[1297]: CRED_ACQ pid=1297 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:13.914000 audit[1298]: USER_ACCT pid=1298 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:13.915653 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 03:56:13.914000 audit[1298]: CRED_REFR pid=1298 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:13.916117 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:56:13.917000 audit[1298]: USER_START pid=1298 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:13.939028 systemd[1]: Starting coreos-metadata.service... Dec 13 03:56:18.424050 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 03:56:18.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:18.425044 systemd[1]: Stopped kubelet.service. Dec 13 03:56:18.439069 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 03:56:18.439264 kernel: audit: type=1130 audit(1734062178.423:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:18.439424 kernel: audit: type=1131 audit(1734062178.423:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:18.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:18.445991 systemd[1]: Starting kubelet.service... Dec 13 03:56:18.806672 kernel: audit: type=1130 audit(1734062178.798:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:18.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:18.799110 systemd[1]: Started kubelet.service. Dec 13 03:56:19.365004 kubelet[1311]: E1213 03:56:19.362923 1311 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:56:19.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:56:19.365513 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:56:19.370449 kernel: audit: type=1131 audit(1734062179.364:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:56:19.365727 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:56:20.999764 coreos-metadata[1302]: Dec 13 03:56:20.999 WARN failed to locate config-drive, using the metadata service API instead Dec 13 03:56:21.084839 coreos-metadata[1302]: Dec 13 03:56:21.084 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 03:56:21.292327 coreos-metadata[1302]: Dec 13 03:56:21.291 INFO Fetch successful Dec 13 03:56:21.292884 coreos-metadata[1302]: Dec 13 03:56:21.292 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Dec 13 03:56:21.303850 coreos-metadata[1302]: Dec 13 03:56:21.303 INFO Fetch successful Dec 13 03:56:21.304271 coreos-metadata[1302]: Dec 13 03:56:21.304 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Dec 13 03:56:21.315461 coreos-metadata[1302]: Dec 13 03:56:21.315 INFO Fetch successful Dec 13 03:56:21.315839 coreos-metadata[1302]: Dec 13 03:56:21.315 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Dec 13 03:56:21.325916 coreos-metadata[1302]: Dec 13 03:56:21.325 INFO Fetch successful Dec 13 03:56:21.326330 coreos-metadata[1302]: Dec 13 03:56:21.326 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Dec 13 03:56:21.340246 coreos-metadata[1302]: Dec 13 03:56:21.339 INFO Fetch successful Dec 13 03:56:21.358810 systemd[1]: Finished coreos-metadata.service. Dec 13 03:56:21.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:21.369483 kernel: audit: type=1130 audit(1734062181.358:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.249940 systemd[1]: Stopped kubelet.service. Dec 13 03:56:23.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.261420 kernel: audit: type=1130 audit(1734062183.250:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.262010 systemd[1]: Starting kubelet.service... Dec 13 03:56:23.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.274423 kernel: audit: type=1131 audit(1734062183.250:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.296197 systemd[1]: Reloading. Dec 13 03:56:23.401790 /usr/lib/systemd/system-generators/torcx-generator[1373]: time="2024-12-13T03:56:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:56:23.401827 /usr/lib/systemd/system-generators/torcx-generator[1373]: time="2024-12-13T03:56:23Z" level=info msg="torcx already run" Dec 13 03:56:23.610336 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:56:23.610379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:56:23.638908 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:56:23.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.728397 kernel: audit: type=1400 audit(1734062183.719:239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.728471 kernel: audit: type=1400 audit(1734062183.719:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.728498 kernel: audit: type=1400 audit(1734062183.723:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.745245 kernel: audit: type=1400 audit(1734062183.723:242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.745315 kernel: audit: type=1400 audit(1734062183.723:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.764323 kernel: audit: type=1400 audit(1734062183.723:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.764419 kernel: audit: type=1400 audit(1734062183.723:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.781472 kernel: audit: type=1400 audit(1734062183.723:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.781540 kernel: audit: type=1400 audit(1734062183.723:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794050 kernel: audit: type=1400 audit(1734062183.733:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.733000 audit: BPF prog-id=43 op=LOAD Dec 13 03:56:23.733000 audit: BPF prog-id=41 op=UNLOAD Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.754000 audit: BPF prog-id=44 op=LOAD Dec 13 03:56:23.754000 audit: BPF prog-id=27 op=UNLOAD Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit: BPF prog-id=45 op=LOAD Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit: BPF prog-id=46 op=LOAD Dec 13 03:56:23.788000 audit: BPF prog-id=28 op=UNLOAD Dec 13 03:56:23.788000 audit: BPF prog-id=29 op=UNLOAD Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit: BPF prog-id=47 op=LOAD Dec 13 03:56:23.794000 audit: BPF prog-id=30 op=UNLOAD Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit: BPF prog-id=48 op=LOAD Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.795000 audit: BPF prog-id=49 op=LOAD Dec 13 03:56:23.795000 audit: BPF prog-id=31 op=UNLOAD Dec 13 03:56:23.795000 audit: BPF prog-id=32 op=UNLOAD Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit: BPF prog-id=50 op=LOAD Dec 13 03:56:23.797000 audit: BPF prog-id=38 op=UNLOAD Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit: BPF prog-id=51 op=LOAD Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.797000 audit: BPF prog-id=52 op=LOAD Dec 13 03:56:23.797000 audit: BPF prog-id=39 op=UNLOAD Dec 13 03:56:23.797000 audit: BPF prog-id=40 op=UNLOAD Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.799000 audit: BPF prog-id=53 op=LOAD Dec 13 03:56:23.799000 audit: BPF prog-id=33 op=UNLOAD Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.800000 audit: BPF prog-id=54 op=LOAD Dec 13 03:56:23.800000 audit: BPF prog-id=36 op=UNLOAD Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit: BPF prog-id=55 op=LOAD Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit: BPF prog-id=56 op=LOAD Dec 13 03:56:23.804000 audit: BPF prog-id=34 op=UNLOAD Dec 13 03:56:23.804000 audit: BPF prog-id=35 op=UNLOAD Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:23.805000 audit: BPF prog-id=57 op=LOAD Dec 13 03:56:23.805000 audit: BPF prog-id=37 op=UNLOAD Dec 13 03:56:23.831897 systemd[1]: Started kubelet.service. Dec 13 03:56:23.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.838419 systemd[1]: Stopping kubelet.service... Dec 13 03:56:23.839769 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 03:56:23.839968 systemd[1]: Stopped kubelet.service. Dec 13 03:56:23.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:23.841843 systemd[1]: Starting kubelet.service... Dec 13 03:56:23.999078 systemd[1]: Started kubelet.service. Dec 13 03:56:24.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:24.098413 kubelet[1432]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:56:24.099205 kubelet[1432]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:56:24.099395 kubelet[1432]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:56:24.099715 kubelet[1432]: I1213 03:56:24.099647 1432 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:56:25.376959 kubelet[1432]: I1213 03:56:25.376886 1432 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 03:56:25.376959 kubelet[1432]: I1213 03:56:25.376934 1432 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:56:25.377535 kubelet[1432]: I1213 03:56:25.377327 1432 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 03:56:25.405846 kubelet[1432]: I1213 03:56:25.405797 1432 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:56:25.423405 kubelet[1432]: I1213 03:56:25.423372 1432 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:56:25.423817 kubelet[1432]: I1213 03:56:25.423784 1432 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:56:25.424079 kubelet[1432]: I1213 03:56:25.423878 1432 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.138","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:56:25.425519 kubelet[1432]: I1213 03:56:25.425503 1432 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:56:25.425602 kubelet[1432]: I1213 03:56:25.425592 1432 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:56:25.427113 kubelet[1432]: I1213 03:56:25.427100 1432 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:56:25.428604 kubelet[1432]: I1213 03:56:25.428591 1432 kubelet.go:400] "Attempting to sync node with API server" Dec 13 03:56:25.428689 kubelet[1432]: I1213 03:56:25.428679 1432 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:56:25.428766 kubelet[1432]: I1213 03:56:25.428756 1432 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:56:25.428838 kubelet[1432]: I1213 03:56:25.428828 1432 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:56:25.429414 kubelet[1432]: E1213 03:56:25.429321 1432 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:25.429577 kubelet[1432]: E1213 03:56:25.429480 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:25.444906 kubelet[1432]: I1213 03:56:25.444877 1432 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:56:25.449703 kubelet[1432]: I1213 03:56:25.449668 1432 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:56:25.449993 kubelet[1432]: W1213 03:56:25.449966 1432 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 03:56:25.451282 kubelet[1432]: W1213 03:56:25.449977 1432 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.24.4.138" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 03:56:25.451447 kubelet[1432]: E1213 03:56:25.451326 1432 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.138" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 03:56:25.451760 kubelet[1432]: I1213 03:56:25.451712 1432 server.go:1264] "Started kubelet" Dec 13 03:56:25.452000 audit[1432]: AVC avc: denied { mac_admin } for pid=1432 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:25.452000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:56:25.452000 audit[1432]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a2c8a0 a1=c0008def30 a2=c000a2c870 a3=25 items=0 ppid=1 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.452000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:56:25.455084 kubelet[1432]: I1213 03:56:25.455040 1432 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:56:25.453000 audit[1432]: AVC avc: denied { mac_admin } for pid=1432 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:25.453000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:56:25.453000 audit[1432]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006fbb40 a1=c0008def48 a2=c000a2c930 a3=25 items=0 ppid=1 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:56:25.455847 kubelet[1432]: I1213 03:56:25.455809 1432 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:56:25.456132 kubelet[1432]: I1213 03:56:25.456105 1432 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:56:25.466415 kubelet[1432]: I1213 03:56:25.466316 1432 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:56:25.468794 kubelet[1432]: I1213 03:56:25.468759 1432 server.go:455] "Adding debug handlers to kubelet server" Dec 13 03:56:25.471076 kubelet[1432]: I1213 03:56:25.470988 1432 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:56:25.471617 kubelet[1432]: I1213 03:56:25.471585 1432 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:56:25.475427 kubelet[1432]: I1213 03:56:25.475395 1432 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:56:25.476774 kubelet[1432]: I1213 03:56:25.476740 1432 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 03:56:25.477038 kubelet[1432]: I1213 03:56:25.477013 1432 reconciler.go:26] "Reconciler: start to sync state" Dec 13 03:56:25.490830 kubelet[1432]: I1213 03:56:25.490755 1432 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:56:25.492026 kubelet[1432]: I1213 03:56:25.491980 1432 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:56:25.499005 kubelet[1432]: E1213 03:56:25.498976 1432 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:56:25.499530 kubelet[1432]: I1213 03:56:25.499507 1432 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:56:25.519817 kubelet[1432]: E1213 03:56:25.519767 1432 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.138\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 03:56:25.519979 kubelet[1432]: W1213 03:56:25.519864 1432 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 03:56:25.519979 kubelet[1432]: E1213 03:56:25.519896 1432 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 03:56:25.519979 kubelet[1432]: W1213 03:56:25.519968 1432 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 03:56:25.520165 kubelet[1432]: E1213 03:56:25.519983 1432 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 03:56:25.521444 kubelet[1432]: E1213 03:56:25.521199 1432 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.138.1810a05ec648b63c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.138,UID:172.24.4.138,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.24.4.138,},FirstTimestamp:2024-12-13 03:56:25.451664956 +0000 UTC m=+1.442247481,LastTimestamp:2024-12-13 03:56:25.451664956 +0000 UTC m=+1.442247481,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.138,}" Dec 13 03:56:25.524380 kubelet[1432]: E1213 03:56:25.524172 1432 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.138.1810a05ec919adb5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.138,UID:172.24.4.138,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.24.4.138,},FirstTimestamp:2024-12-13 03:56:25.498914229 +0000 UTC m=+1.489496734,LastTimestamp:2024-12-13 03:56:25.498914229 +0000 UTC m=+1.489496734,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.138,}" Dec 13 03:56:25.528229 kubelet[1432]: I1213 03:56:25.528190 1432 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:56:25.528386 kubelet[1432]: I1213 03:56:25.528375 1432 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:56:25.528458 kubelet[1432]: I1213 03:56:25.528449 1432 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:56:25.543578 kubelet[1432]: I1213 03:56:25.543558 1432 policy_none.go:49] "None policy: Start" Dec 13 03:56:25.544372 kubelet[1432]: I1213 03:56:25.544335 1432 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:56:25.544458 kubelet[1432]: I1213 03:56:25.544448 1432 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:56:25.559563 systemd[1]: Created slice kubepods.slice. Dec 13 03:56:25.562000 audit[1445]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.562000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff2a4bea0 a2=0 a3=7ffff2a4be8c items=0 ppid=1432 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:56:25.567710 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 03:56:25.567000 audit[1451]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.567000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd7242f0d0 a2=0 a3=7ffd7242f0bc items=0 ppid=1432 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:56:25.572192 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 03:56:25.576966 kubelet[1432]: I1213 03:56:25.576933 1432 kubelet_node_status.go:73] "Attempting to register node" node="172.24.4.138" Dec 13 03:56:25.577000 audit[1432]: AVC avc: denied { mac_admin } for pid=1432 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:25.577000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:56:25.577000 audit[1432]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037d920 a1=c0008df878 a2=c00037d8c0 a3=25 items=0 ppid=1 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.577000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:56:25.578688 kubelet[1432]: I1213 03:56:25.578381 1432 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:56:25.578688 kubelet[1432]: I1213 03:56:25.578455 1432 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:56:25.578688 kubelet[1432]: I1213 03:56:25.578610 1432 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 03:56:25.578799 kubelet[1432]: I1213 03:56:25.578746 1432 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:56:25.581731 kubelet[1432]: E1213 03:56:25.581711 1432 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.138\" not found" Dec 13 03:56:25.573000 audit[1453]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.573000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffce2ddd5e0 a2=0 a3=7ffce2ddd5cc items=0 ppid=1432 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:56:25.595265 kubelet[1432]: I1213 03:56:25.595242 1432 kubelet_node_status.go:76] "Successfully registered node" node="172.24.4.138" Dec 13 03:56:25.595000 audit[1459]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.595000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0e98b6e0 a2=0 a3=7ffc0e98b6cc items=0 ppid=1432 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:56:25.613970 kubelet[1432]: E1213 03:56:25.613941 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:25.681000 audit[1464]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.681000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffd67b4e00 a2=0 a3=7fffd67b4dec items=0 ppid=1432 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 03:56:25.684114 kubelet[1432]: I1213 03:56:25.683780 1432 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:56:25.683000 audit[1465]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:25.683000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8edb7ad0 a2=0 a3=7fff8edb7abc items=0 ppid=1432 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:56:25.685646 kubelet[1432]: I1213 03:56:25.685450 1432 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:56:25.685646 kubelet[1432]: I1213 03:56:25.685501 1432 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:56:25.685646 kubelet[1432]: I1213 03:56:25.685534 1432 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 03:56:25.685646 kubelet[1432]: E1213 03:56:25.685588 1432 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 03:56:25.686000 audit[1467]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:25.686000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd51ef24f0 a2=0 a3=7ffd51ef24dc items=0 ppid=1432 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:56:25.687000 audit[1466]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.687000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffb24c4d0 a2=0 a3=7ffffb24c4bc items=0 ppid=1432 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:56:25.689000 audit[1469]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:25.689000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe8dbd6c80 a2=0 a3=7ffe8dbd6c6c items=0 ppid=1432 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:56:25.689000 audit[1468]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.689000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd17f5c020 a2=0 a3=7ffd17f5c00c items=0 ppid=1432 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:56:25.691000 audit[1471]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:25.691000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffead06c9b0 a2=0 a3=7ffead06c99c items=0 ppid=1432 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:56:25.692000 audit[1470]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:25.692000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc6d8dae0 a2=0 a3=7ffcc6d8dacc items=0 ppid=1432 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:25.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:56:25.714738 kubelet[1432]: E1213 03:56:25.714673 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:25.815418 kubelet[1432]: E1213 03:56:25.815303 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:25.916106 kubelet[1432]: E1213 03:56:25.915964 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.017325 kubelet[1432]: E1213 03:56:26.017048 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.065491 sudo[1298]: pam_unix(sudo:session): session closed for user root Dec 13 03:56:26.064000 audit[1298]: USER_END pid=1298 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:26.065000 audit[1298]: CRED_DISP pid=1298 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:56:26.118099 kubelet[1432]: E1213 03:56:26.117977 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.218502 kubelet[1432]: E1213 03:56:26.218424 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.300045 sshd[1295]: pam_unix(sshd:session): session closed for user core Dec 13 03:56:26.302000 audit[1295]: USER_END pid=1295 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:26.302000 audit[1295]: CRED_DISP pid=1295 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:56:26.307851 systemd-logind[1140]: Session 7 logged out. Waiting for processes to exit. Dec 13 03:56:26.308127 systemd[1]: sshd@6-172.24.4.138:22-172.24.4.1:60194.service: Deactivated successfully. Dec 13 03:56:26.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.138:22-172.24.4.1:60194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:56:26.309709 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 03:56:26.310008 systemd[1]: session-7.scope: Consumed 1.132s CPU time. Dec 13 03:56:26.312022 systemd-logind[1140]: Removed session 7. Dec 13 03:56:26.319491 kubelet[1432]: E1213 03:56:26.319430 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.389876 kubelet[1432]: I1213 03:56:26.389828 1432 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 03:56:26.390815 kubelet[1432]: W1213 03:56:26.390761 1432 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:56:26.420493 kubelet[1432]: E1213 03:56:26.420422 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.429823 kubelet[1432]: E1213 03:56:26.429780 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:26.520830 kubelet[1432]: E1213 03:56:26.520713 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.621912 kubelet[1432]: E1213 03:56:26.621700 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.723313 kubelet[1432]: E1213 03:56:26.723143 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.823490 kubelet[1432]: E1213 03:56:26.823318 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:26.923825 kubelet[1432]: E1213 03:56:26.923774 1432 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.138\" not found" Dec 13 03:56:27.026656 kubelet[1432]: I1213 03:56:27.026604 1432 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 03:56:27.027868 env[1148]: time="2024-12-13T03:56:27.027784409Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 03:56:27.028722 kubelet[1432]: I1213 03:56:27.028634 1432 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 03:56:27.430953 kubelet[1432]: I1213 03:56:27.430874 1432 apiserver.go:52] "Watching apiserver" Dec 13 03:56:27.432585 kubelet[1432]: E1213 03:56:27.432532 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:27.446742 kubelet[1432]: I1213 03:56:27.446676 1432 topology_manager.go:215] "Topology Admit Handler" podUID="094ddb41-4172-4d20-b7e2-1e3534209d54" podNamespace="calico-system" podName="calico-node-l2l65" Dec 13 03:56:27.447262 kubelet[1432]: I1213 03:56:27.447216 1432 topology_manager.go:215] "Topology Admit Handler" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" podNamespace="calico-system" podName="csi-node-driver-z7q9m" Dec 13 03:56:27.447868 kubelet[1432]: I1213 03:56:27.447828 1432 topology_manager.go:215] "Topology Admit Handler" podUID="a12e320e-fb47-493e-80e6-6fa36b9d3b24" podNamespace="kube-system" podName="kube-proxy-ztfd2" Dec 13 03:56:27.449507 kubelet[1432]: E1213 03:56:27.449461 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:27.463035 systemd[1]: Created slice kubepods-besteffort-pod094ddb41_4172_4d20_b7e2_1e3534209d54.slice. Dec 13 03:56:27.477323 systemd[1]: Created slice kubepods-besteffort-poda12e320e_fb47_493e_80e6_6fa36b9d3b24.slice. Dec 13 03:56:27.487874 kubelet[1432]: I1213 03:56:27.487603 1432 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 03:56:27.490568 kubelet[1432]: I1213 03:56:27.490519 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3248c8fa-ef89-40b6-a6ff-86c801d74517-registration-dir\") pod \"csi-node-driver-z7q9m\" (UID: \"3248c8fa-ef89-40b6-a6ff-86c801d74517\") " pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:27.492342 kubelet[1432]: I1213 03:56:27.492264 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-xtables-lock\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.492515 kubelet[1432]: I1213 03:56:27.492338 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-policysync\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.492515 kubelet[1432]: I1213 03:56:27.492420 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-bin-dir\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.492515 kubelet[1432]: I1213 03:56:27.492478 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8mgxv\" (UniqueName: \"kubernetes.io/projected/094ddb41-4172-4d20-b7e2-1e3534209d54-kube-api-access-8mgxv\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.492742 kubelet[1432]: I1213 03:56:27.492522 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3248c8fa-ef89-40b6-a6ff-86c801d74517-varrun\") pod \"csi-node-driver-z7q9m\" (UID: \"3248c8fa-ef89-40b6-a6ff-86c801d74517\") " pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:27.492742 kubelet[1432]: I1213 03:56:27.492568 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gh59g\" (UniqueName: \"kubernetes.io/projected/3248c8fa-ef89-40b6-a6ff-86c801d74517-kube-api-access-gh59g\") pod \"csi-node-driver-z7q9m\" (UID: \"3248c8fa-ef89-40b6-a6ff-86c801d74517\") " pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:27.492742 kubelet[1432]: I1213 03:56:27.492611 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwsgf\" (UniqueName: \"kubernetes.io/projected/a12e320e-fb47-493e-80e6-6fa36b9d3b24-kube-api-access-fwsgf\") pod \"kube-proxy-ztfd2\" (UID: \"a12e320e-fb47-493e-80e6-6fa36b9d3b24\") " pod="kube-system/kube-proxy-ztfd2" Dec 13 03:56:27.492742 kubelet[1432]: I1213 03:56:27.492653 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-lib-calico\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.492742 kubelet[1432]: I1213 03:56:27.492694 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-net-dir\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.493082 kubelet[1432]: I1213 03:56:27.492733 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-flexvol-driver-host\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.493082 kubelet[1432]: I1213 03:56:27.492771 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-log-dir\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.493082 kubelet[1432]: I1213 03:56:27.492812 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a12e320e-fb47-493e-80e6-6fa36b9d3b24-xtables-lock\") pod \"kube-proxy-ztfd2\" (UID: \"a12e320e-fb47-493e-80e6-6fa36b9d3b24\") " pod="kube-system/kube-proxy-ztfd2" Dec 13 03:56:27.493082 kubelet[1432]: I1213 03:56:27.492849 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-run-calico\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.493082 kubelet[1432]: I1213 03:56:27.492886 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3248c8fa-ef89-40b6-a6ff-86c801d74517-kubelet-dir\") pod \"csi-node-driver-z7q9m\" (UID: \"3248c8fa-ef89-40b6-a6ff-86c801d74517\") " pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:27.493515 kubelet[1432]: I1213 03:56:27.492927 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3248c8fa-ef89-40b6-a6ff-86c801d74517-socket-dir\") pod \"csi-node-driver-z7q9m\" (UID: \"3248c8fa-ef89-40b6-a6ff-86c801d74517\") " pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:27.493515 kubelet[1432]: I1213 03:56:27.492965 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a12e320e-fb47-493e-80e6-6fa36b9d3b24-kube-proxy\") pod \"kube-proxy-ztfd2\" (UID: \"a12e320e-fb47-493e-80e6-6fa36b9d3b24\") " pod="kube-system/kube-proxy-ztfd2" Dec 13 03:56:27.493515 kubelet[1432]: I1213 03:56:27.493021 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a12e320e-fb47-493e-80e6-6fa36b9d3b24-lib-modules\") pod \"kube-proxy-ztfd2\" (UID: \"a12e320e-fb47-493e-80e6-6fa36b9d3b24\") " pod="kube-system/kube-proxy-ztfd2" Dec 13 03:56:27.493515 kubelet[1432]: I1213 03:56:27.493062 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-lib-modules\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.493515 kubelet[1432]: I1213 03:56:27.493102 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/094ddb41-4172-4d20-b7e2-1e3534209d54-tigera-ca-bundle\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.493836 kubelet[1432]: I1213 03:56:27.493142 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/094ddb41-4172-4d20-b7e2-1e3534209d54-node-certs\") pod \"calico-node-l2l65\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " pod="calico-system/calico-node-l2l65" Dec 13 03:56:27.597543 kubelet[1432]: E1213 03:56:27.597477 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.597912 kubelet[1432]: W1213 03:56:27.597861 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.598236 kubelet[1432]: E1213 03:56:27.598187 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.598820 kubelet[1432]: E1213 03:56:27.598767 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.598820 kubelet[1432]: W1213 03:56:27.598812 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.599175 kubelet[1432]: E1213 03:56:27.598858 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.599327 kubelet[1432]: E1213 03:56:27.599263 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.599327 kubelet[1432]: W1213 03:56:27.599286 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.599327 kubelet[1432]: E1213 03:56:27.599308 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.599785 kubelet[1432]: E1213 03:56:27.599626 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.599785 kubelet[1432]: W1213 03:56:27.599646 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.599785 kubelet[1432]: E1213 03:56:27.599666 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.600144 kubelet[1432]: E1213 03:56:27.599975 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.600144 kubelet[1432]: W1213 03:56:27.599994 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.600144 kubelet[1432]: E1213 03:56:27.600015 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.615985 kubelet[1432]: E1213 03:56:27.615939 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.616234 kubelet[1432]: W1213 03:56:27.616212 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.616342 kubelet[1432]: E1213 03:56:27.616321 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.628202 kubelet[1432]: E1213 03:56:27.628155 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.628540 kubelet[1432]: W1213 03:56:27.628504 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.628705 kubelet[1432]: E1213 03:56:27.628677 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.638312 kubelet[1432]: E1213 03:56:27.638275 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.638606 kubelet[1432]: W1213 03:56:27.638574 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.638764 kubelet[1432]: E1213 03:56:27.638735 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.648559 kubelet[1432]: E1213 03:56:27.647328 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:27.648559 kubelet[1432]: W1213 03:56:27.647406 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:27.648559 kubelet[1432]: E1213 03:56:27.647446 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:27.789657 env[1148]: time="2024-12-13T03:56:27.784895724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l2l65,Uid:094ddb41-4172-4d20-b7e2-1e3534209d54,Namespace:calico-system,Attempt:0,}" Dec 13 03:56:27.795586 env[1148]: time="2024-12-13T03:56:27.795222144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ztfd2,Uid:a12e320e-fb47-493e-80e6-6fa36b9d3b24,Namespace:kube-system,Attempt:0,}" Dec 13 03:56:28.433950 kubelet[1432]: E1213 03:56:28.433866 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:28.687287 kubelet[1432]: E1213 03:56:28.687030 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:29.434830 kubelet[1432]: E1213 03:56:29.434679 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:30.001920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4011874153.mount: Deactivated successfully. Dec 13 03:56:30.042395 env[1148]: time="2024-12-13T03:56:30.042237322Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.048780 env[1148]: time="2024-12-13T03:56:30.048705858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.059751 env[1148]: time="2024-12-13T03:56:30.059644194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.062333 env[1148]: time="2024-12-13T03:56:30.062240027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.064215 env[1148]: time="2024-12-13T03:56:30.064150363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.070718 env[1148]: time="2024-12-13T03:56:30.070647554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.074699 env[1148]: time="2024-12-13T03:56:30.074643560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.076903 env[1148]: time="2024-12-13T03:56:30.076849587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:30.162024 env[1148]: time="2024-12-13T03:56:30.161859896Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:56:30.162408 env[1148]: time="2024-12-13T03:56:30.162037401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:56:30.162408 env[1148]: time="2024-12-13T03:56:30.162143922Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:56:30.162957 env[1148]: time="2024-12-13T03:56:30.162835177Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf pid=1493 runtime=io.containerd.runc.v2 Dec 13 03:56:30.177499 env[1148]: time="2024-12-13T03:56:30.177281359Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:56:30.177722 env[1148]: time="2024-12-13T03:56:30.177448775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:56:30.177722 env[1148]: time="2024-12-13T03:56:30.177534907Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:56:30.178139 env[1148]: time="2024-12-13T03:56:30.177979197Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10e2a2d8a57d16e63ac5ea368e4484fcd80ea5aeeb7b40933091de2a210cd444 pid=1504 runtime=io.containerd.runc.v2 Dec 13 03:56:30.201617 systemd[1]: Started cri-containerd-10e2a2d8a57d16e63ac5ea368e4484fcd80ea5aeeb7b40933091de2a210cd444.scope. Dec 13 03:56:30.226181 kernel: kauditd_printk_skb: 218 callbacks suppressed Dec 13 03:56:30.226418 kernel: audit: type=1400 audit(1734062190.219:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.226479 kernel: audit: type=1400 audit(1734062190.219:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.233076 kernel: audit: type=1400 audit(1734062190.219:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.233133 kernel: audit: type=1400 audit(1734062190.219:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.240455 kernel: audit: type=1400 audit(1734062190.219:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.240544 kernel: audit: type=1400 audit(1734062190.219:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.247744 kernel: audit: type=1400 audit(1734062190.219:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.247814 kernel: audit: type=1400 audit(1734062190.219:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.258811 systemd[1]: Started cri-containerd-ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf.scope. Dec 13 03:56:30.260303 kernel: audit: type=1400 audit(1734062190.219:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.260421 kernel: audit: type=1400 audit(1734062190.224:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.224000 audit: BPF prog-id=58 op=LOAD Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1504 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653261326438613537643136653633616335656133363865343438 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1504 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653261326438613537643136653633616335656133363865343438 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.227000 audit: BPF prog-id=59 op=LOAD Dec 13 03:56:30.227000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6e80 items=0 ppid=1504 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653261326438613537643136653633616335656133363865343438 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.228000 audit: BPF prog-id=60 op=LOAD Dec 13 03:56:30.228000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6ec8 items=0 ppid=1504 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653261326438613537643136653633616335656133363865343438 Dec 13 03:56:30.236000 audit: BPF prog-id=60 op=UNLOAD Dec 13 03:56:30.236000 audit: BPF prog-id=59 op=UNLOAD Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.236000 audit: BPF prog-id=61 op=LOAD Dec 13 03:56:30.236000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d72d8 items=0 ppid=1504 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653261326438613537643136653633616335656133363865343438 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.275000 audit: BPF prog-id=62 op=LOAD Dec 13 03:56:30.276000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.276000 audit[1519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1493 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313233326138613831393234373266383832323534393562316163 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1493 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313233326138613831393234373266383832323534393562316163 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit: BPF prog-id=63 op=LOAD Dec 13 03:56:30.277000 audit[1519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002fab00 items=0 ppid=1493 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313233326138613831393234373266383832323534393562316163 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit: BPF prog-id=64 op=LOAD Dec 13 03:56:30.277000 audit[1519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002fab48 items=0 ppid=1493 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313233326138613831393234373266383832323534393562316163 Dec 13 03:56:30.277000 audit: BPF prog-id=64 op=UNLOAD Dec 13 03:56:30.277000 audit: BPF prog-id=63 op=UNLOAD Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { perfmon } for pid=1519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit[1519]: AVC avc: denied { bpf } for pid=1519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:30.277000 audit: BPF prog-id=65 op=LOAD Dec 13 03:56:30.277000 audit[1519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002faf58 items=0 ppid=1493 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:30.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313233326138613831393234373266383832323534393562316163 Dec 13 03:56:30.288984 env[1148]: time="2024-12-13T03:56:30.288908514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ztfd2,Uid:a12e320e-fb47-493e-80e6-6fa36b9d3b24,Namespace:kube-system,Attempt:0,} returns sandbox id \"10e2a2d8a57d16e63ac5ea368e4484fcd80ea5aeeb7b40933091de2a210cd444\"" Dec 13 03:56:30.292538 env[1148]: time="2024-12-13T03:56:30.292507531Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 03:56:30.299862 env[1148]: time="2024-12-13T03:56:30.299811454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l2l65,Uid:094ddb41-4172-4d20-b7e2-1e3534209d54,Namespace:calico-system,Attempt:0,} returns sandbox id \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\"" Dec 13 03:56:30.435037 kubelet[1432]: E1213 03:56:30.434929 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:30.687912 kubelet[1432]: E1213 03:56:30.687158 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:31.435716 kubelet[1432]: E1213 03:56:31.435610 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:31.913165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1460432500.mount: Deactivated successfully. Dec 13 03:56:32.436829 kubelet[1432]: E1213 03:56:32.436764 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:32.686181 kubelet[1432]: E1213 03:56:32.686054 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:32.844193 env[1148]: time="2024-12-13T03:56:32.843945003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:32.850766 env[1148]: time="2024-12-13T03:56:32.850694919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:32.853264 env[1148]: time="2024-12-13T03:56:32.853212530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:32.862506 env[1148]: time="2024-12-13T03:56:32.862452885Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:32.862844 env[1148]: time="2024-12-13T03:56:32.862794590Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 03:56:32.868644 env[1148]: time="2024-12-13T03:56:32.868573324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 03:56:32.869873 env[1148]: time="2024-12-13T03:56:32.869813444Z" level=info msg="CreateContainer within sandbox \"10e2a2d8a57d16e63ac5ea368e4484fcd80ea5aeeb7b40933091de2a210cd444\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 03:56:32.900645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount515856414.mount: Deactivated successfully. Dec 13 03:56:32.908415 env[1148]: time="2024-12-13T03:56:32.907818737Z" level=info msg="CreateContainer within sandbox \"10e2a2d8a57d16e63ac5ea368e4484fcd80ea5aeeb7b40933091de2a210cd444\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3c8dd0482fc80b10b0a4751021ff8fa07936428f05106bf0887b1a95848caab2\"" Dec 13 03:56:32.908880 env[1148]: time="2024-12-13T03:56:32.908744182Z" level=info msg="StartContainer for \"3c8dd0482fc80b10b0a4751021ff8fa07936428f05106bf0887b1a95848caab2\"" Dec 13 03:56:32.945558 systemd[1]: Started cri-containerd-3c8dd0482fc80b10b0a4751021ff8fa07936428f05106bf0887b1a95848caab2.scope. Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5e8875d1b8 items=0 ppid=1504 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:32.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386464303438326663383062313062306134373531303231666638 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.963000 audit: BPF prog-id=66 op=LOAD Dec 13 03:56:32.963000 audit[1574]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00026beb8 items=0 ppid=1504 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:32.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386464303438326663383062313062306134373531303231666638 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit: BPF prog-id=67 op=LOAD Dec 13 03:56:32.965000 audit[1574]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00026bf08 items=0 ppid=1504 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:32.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386464303438326663383062313062306134373531303231666638 Dec 13 03:56:32.965000 audit: BPF prog-id=67 op=UNLOAD Dec 13 03:56:32.965000 audit: BPF prog-id=66 op=UNLOAD Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { perfmon } for pid=1574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit[1574]: AVC avc: denied { bpf } for pid=1574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:32.965000 audit: BPF prog-id=68 op=LOAD Dec 13 03:56:32.965000 audit[1574]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00026bf98 items=0 ppid=1504 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:32.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386464303438326663383062313062306134373531303231666638 Dec 13 03:56:32.992655 env[1148]: time="2024-12-13T03:56:32.992586324Z" level=info msg="StartContainer for \"3c8dd0482fc80b10b0a4751021ff8fa07936428f05106bf0887b1a95848caab2\" returns successfully" Dec 13 03:56:33.063000 audit[1624]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.063000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccfd3cfe0 a2=0 a3=7ffccfd3cfcc items=0 ppid=1584 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:56:33.064000 audit[1625]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.064000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff29e71030 a2=0 a3=7fff29e7101c items=0 ppid=1584 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:56:33.064000 audit[1626]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.064000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff799048a0 a2=0 a3=7fff7990488c items=0 ppid=1584 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:56:33.065000 audit[1628]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.065000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe178e4960 a2=0 a3=7ffe178e494c items=0 ppid=1584 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:56:33.065000 audit[1627]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.065000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbacc2190 a2=0 a3=c3374eb5e95f61eb items=0 ppid=1584 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:56:33.066000 audit[1629]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.066000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce14d0db0 a2=0 a3=7ffce14d0d9c items=0 ppid=1584 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:56:33.172000 audit[1630]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.172000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc016a0d40 a2=0 a3=7ffc016a0d2c items=0 ppid=1584 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:56:33.184000 audit[1632]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.184000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2806bb70 a2=0 a3=7ffc2806bb5c items=0 ppid=1584 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 03:56:33.192000 audit[1635]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.192000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff79681c80 a2=0 a3=7fff79681c6c items=0 ppid=1584 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 03:56:33.195000 audit[1636]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.195000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd49bbd9d0 a2=0 a3=7ffd49bbd9bc items=0 ppid=1584 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:56:33.201000 audit[1638]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.201000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebbbaebe0 a2=0 a3=7ffebbbaebcc items=0 ppid=1584 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:56:33.204000 audit[1639]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.204000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9e4f21f0 a2=0 a3=7ffc9e4f21dc items=0 ppid=1584 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:56:33.214000 audit[1641]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.214000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe5f50c350 a2=0 a3=7ffe5f50c33c items=0 ppid=1584 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:56:33.223000 audit[1644]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.223000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff350caf10 a2=0 a3=7fff350caefc items=0 ppid=1584 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 03:56:33.226000 audit[1645]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.226000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2616f380 a2=0 a3=7ffd2616f36c items=0 ppid=1584 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:56:33.246000 audit[1647]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.246000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeaac9ed40 a2=0 a3=7ffeaac9ed2c items=0 ppid=1584 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:56:33.249000 audit[1648]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.249000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe09341850 a2=0 a3=7ffe0934183c items=0 ppid=1584 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:56:33.256000 audit[1650]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.256000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf97c9f80 a2=0 a3=7ffcf97c9f6c items=0 ppid=1584 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:56:33.263000 audit[1653]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.263000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed77d2d70 a2=0 a3=7ffed77d2d5c items=0 ppid=1584 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:56:33.270000 audit[1656]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.270000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6fa34ba0 a2=0 a3=7ffe6fa34b8c items=0 ppid=1584 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:56:33.272000 audit[1657]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.272000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb18e4800 a2=0 a3=7ffeb18e47ec items=0 ppid=1584 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:56:33.274000 audit[1659]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.274000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeb29baf80 a2=0 a3=7ffeb29baf6c items=0 ppid=1584 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:56:33.376000 audit[1664]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.376000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffecac89270 a2=0 a3=7ffecac8925c items=0 ppid=1584 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:56:33.379000 audit[1665]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.379000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc31851dd0 a2=0 a3=7ffc31851dbc items=0 ppid=1584 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:56:33.384000 audit[1667]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:56:33.384000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdcf8c4750 a2=0 a3=7ffdcf8c473c items=0 ppid=1584 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:56:33.428000 audit[1673]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:33.428000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffccdf8f8b0 a2=0 a3=7ffccdf8f89c items=0 ppid=1584 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:33.438665 kubelet[1432]: E1213 03:56:33.438584 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:33.505000 audit[1673]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:33.505000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffccdf8f8b0 a2=0 a3=7ffccdf8f89c items=0 ppid=1584 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:33.541000 audit[1681]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.541000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc89b182c0 a2=0 a3=7ffc89b182ac items=0 ppid=1584 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:56:33.546000 audit[1683]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.546000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd590b9450 a2=0 a3=7ffd590b943c items=0 ppid=1584 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 03:56:33.556000 audit[1686]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.556000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3f3cbbf0 a2=0 a3=7ffe3f3cbbdc items=0 ppid=1584 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 03:56:33.559000 audit[1687]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.559000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee69798d0 a2=0 a3=7ffee69798bc items=0 ppid=1584 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:56:33.564000 audit[1689]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.564000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff55a1da60 a2=0 a3=7fff55a1da4c items=0 ppid=1584 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:56:33.567000 audit[1690]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.567000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe588c3fe0 a2=0 a3=7ffe588c3fcc items=0 ppid=1584 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:56:33.572000 audit[1692]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.572000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde37f0160 a2=0 a3=7ffde37f014c items=0 ppid=1584 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 03:56:33.580000 audit[1695]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.580000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff653a2a0 a2=0 a3=7ffff653a28c items=0 ppid=1584 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:56:33.585000 audit[1696]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.585000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4cae4860 a2=0 a3=7ffd4cae484c items=0 ppid=1584 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:56:33.591000 audit[1698]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.591000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef9eddb60 a2=0 a3=7ffef9eddb4c items=0 ppid=1584 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:56:33.593000 audit[1699]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.593000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5ddf14f0 a2=0 a3=7fff5ddf14dc items=0 ppid=1584 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:56:33.600000 audit[1701]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.600000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd00724440 a2=0 a3=7ffd0072442c items=0 ppid=1584 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:56:33.604000 audit[1704]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.604000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9538edd0 a2=0 a3=7fff9538edbc items=0 ppid=1584 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:56:33.610000 audit[1707]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.610000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffef46e0e0 a2=0 a3=7fffef46e0cc items=0 ppid=1584 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 03:56:33.613000 audit[1708]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.613000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef8e1ff20 a2=0 a3=7ffef8e1ff0c items=0 ppid=1584 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.613000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:56:33.615000 audit[1710]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.615000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc49ce34a0 a2=0 a3=7ffc49ce348c items=0 ppid=1584 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:56:33.622000 audit[1713]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.622000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd537519e0 a2=0 a3=7ffd537519cc items=0 ppid=1584 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:56:33.644000 audit[1714]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.644000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc13ff7320 a2=0 a3=7ffc13ff730c items=0 ppid=1584 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:56:33.648000 audit[1716]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.648000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf3b71290 a2=0 a3=7ffdf3b7127c items=0 ppid=1584 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:56:33.650000 audit[1717]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.650000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd689ae750 a2=0 a3=7ffd689ae73c items=0 ppid=1584 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:56:33.653000 audit[1719]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.653000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2c0efbc0 a2=0 a3=7ffd2c0efbac items=0 ppid=1584 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:56:33.657000 audit[1722]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:56:33.657000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde6d3f9d0 a2=0 a3=7ffde6d3f9bc items=0 ppid=1584 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:56:33.660000 audit[1724]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:56:33.660000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdc0327870 a2=0 a3=7ffdc032785c items=0 ppid=1584 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.660000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:33.661000 audit[1724]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:56:33.661000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdc0327870 a2=0 a3=7ffdc032785c items=0 ppid=1584 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:33.661000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.732400 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.734789 kubelet[1432]: W1213 03:56:33.732446 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.732482 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.732918 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.734789 kubelet[1432]: W1213 03:56:33.732989 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.733016 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.733429 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.734789 kubelet[1432]: W1213 03:56:33.733451 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.733473 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.734789 kubelet[1432]: E1213 03:56:33.733841 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.736738 kubelet[1432]: W1213 03:56:33.733917 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.736738 kubelet[1432]: E1213 03:56:33.733944 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.736738 kubelet[1432]: E1213 03:56:33.734257 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.736738 kubelet[1432]: W1213 03:56:33.734277 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.736738 kubelet[1432]: E1213 03:56:33.734298 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.736738 kubelet[1432]: E1213 03:56:33.735508 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.736738 kubelet[1432]: W1213 03:56:33.735532 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.736738 kubelet[1432]: E1213 03:56:33.735557 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.736738 kubelet[1432]: E1213 03:56:33.735983 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.736738 kubelet[1432]: W1213 03:56:33.736009 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.738615 kubelet[1432]: E1213 03:56:33.736030 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.738615 kubelet[1432]: E1213 03:56:33.737580 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.738615 kubelet[1432]: W1213 03:56:33.737602 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.738615 kubelet[1432]: E1213 03:56:33.737683 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.738615 kubelet[1432]: E1213 03:56:33.738064 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.738615 kubelet[1432]: W1213 03:56:33.738085 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.738615 kubelet[1432]: E1213 03:56:33.738105 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.739810 kubelet[1432]: E1213 03:56:33.739293 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.739810 kubelet[1432]: W1213 03:56:33.739322 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.739810 kubelet[1432]: E1213 03:56:33.739489 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.740476 kubelet[1432]: E1213 03:56:33.740167 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.740476 kubelet[1432]: W1213 03:56:33.740195 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.740476 kubelet[1432]: E1213 03:56:33.740218 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.740980 kubelet[1432]: E1213 03:56:33.740954 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.741201 kubelet[1432]: W1213 03:56:33.741171 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.741470 kubelet[1432]: E1213 03:56:33.741326 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.742002 kubelet[1432]: E1213 03:56:33.741977 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.742226 kubelet[1432]: W1213 03:56:33.742197 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.742490 kubelet[1432]: E1213 03:56:33.742461 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.742970 kubelet[1432]: E1213 03:56:33.742944 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.743213 kubelet[1432]: W1213 03:56:33.743182 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.743431 kubelet[1432]: E1213 03:56:33.743379 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.743997 kubelet[1432]: E1213 03:56:33.743962 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.744220 kubelet[1432]: W1213 03:56:33.744190 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.744541 kubelet[1432]: I1213 03:56:33.734653 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ztfd2" podStartSLOduration=6.15942674 podStartE2EDuration="8.734612794s" podCreationTimestamp="2024-12-13 03:56:25 +0000 UTC" firstStartedPulling="2024-12-13 03:56:30.291877211 +0000 UTC m=+6.282459696" lastFinishedPulling="2024-12-13 03:56:32.867063275 +0000 UTC m=+8.857645750" observedRunningTime="2024-12-13 03:56:33.734156453 +0000 UTC m=+9.724738988" watchObservedRunningTime="2024-12-13 03:56:33.734612794 +0000 UTC m=+9.725195319" Dec 13 03:56:33.745548 kubelet[1432]: E1213 03:56:33.744582 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.746154 kubelet[1432]: E1213 03:56:33.746125 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.746316 kubelet[1432]: W1213 03:56:33.746290 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.746619 kubelet[1432]: E1213 03:56:33.746588 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.747205 kubelet[1432]: E1213 03:56:33.747124 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.747435 kubelet[1432]: W1213 03:56:33.747404 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.747651 kubelet[1432]: E1213 03:56:33.747621 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.748484 kubelet[1432]: E1213 03:56:33.748455 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.748645 kubelet[1432]: W1213 03:56:33.748618 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.748818 kubelet[1432]: E1213 03:56:33.748791 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.749481 kubelet[1432]: E1213 03:56:33.749454 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.749660 kubelet[1432]: W1213 03:56:33.749632 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.749808 kubelet[1432]: E1213 03:56:33.749782 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.750335 kubelet[1432]: E1213 03:56:33.750308 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.750557 kubelet[1432]: W1213 03:56:33.750528 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.750721 kubelet[1432]: E1213 03:56:33.750694 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.751490 kubelet[1432]: E1213 03:56:33.751463 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.751648 kubelet[1432]: W1213 03:56:33.751623 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.751788 kubelet[1432]: E1213 03:56:33.751764 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.752321 kubelet[1432]: E1213 03:56:33.752295 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.752540 kubelet[1432]: W1213 03:56:33.752513 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.752735 kubelet[1432]: E1213 03:56:33.752702 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.753235 kubelet[1432]: E1213 03:56:33.753185 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.753424 kubelet[1432]: W1213 03:56:33.753235 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.753424 kubelet[1432]: E1213 03:56:33.753285 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.753727 kubelet[1432]: E1213 03:56:33.753686 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.753727 kubelet[1432]: W1213 03:56:33.753723 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.754006 kubelet[1432]: E1213 03:56:33.753749 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.754528 kubelet[1432]: E1213 03:56:33.754492 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.754528 kubelet[1432]: W1213 03:56:33.754524 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.754819 kubelet[1432]: E1213 03:56:33.754784 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.755039 kubelet[1432]: E1213 03:56:33.754862 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.755233 kubelet[1432]: W1213 03:56:33.755203 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.755457 kubelet[1432]: E1213 03:56:33.755428 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.755863 kubelet[1432]: E1213 03:56:33.755827 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.755863 kubelet[1432]: W1213 03:56:33.755859 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.756040 kubelet[1432]: E1213 03:56:33.755897 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.756659 kubelet[1432]: E1213 03:56:33.756632 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.756922 kubelet[1432]: W1213 03:56:33.756893 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.757097 kubelet[1432]: E1213 03:56:33.757068 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.757468 kubelet[1432]: E1213 03:56:33.757432 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.757468 kubelet[1432]: W1213 03:56:33.757464 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.757658 kubelet[1432]: E1213 03:56:33.757500 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.757892 kubelet[1432]: E1213 03:56:33.757858 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.757892 kubelet[1432]: W1213 03:56:33.757889 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.758082 kubelet[1432]: E1213 03:56:33.757913 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.758501 kubelet[1432]: E1213 03:56:33.758465 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.758501 kubelet[1432]: W1213 03:56:33.758497 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.758663 kubelet[1432]: E1213 03:56:33.758520 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:33.759587 kubelet[1432]: E1213 03:56:33.759550 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:33.759587 kubelet[1432]: W1213 03:56:33.759583 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:33.759776 kubelet[1432]: E1213 03:56:33.759606 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.440879 kubelet[1432]: E1213 03:56:34.440784 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:34.686578 kubelet[1432]: E1213 03:56:34.686496 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:34.713953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1311158432.mount: Deactivated successfully. Dec 13 03:56:34.757618 kubelet[1432]: E1213 03:56:34.757556 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.757618 kubelet[1432]: W1213 03:56:34.757586 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.757618 kubelet[1432]: E1213 03:56:34.757627 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.757987 kubelet[1432]: E1213 03:56:34.757895 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.757987 kubelet[1432]: W1213 03:56:34.757906 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.757987 kubelet[1432]: E1213 03:56:34.757917 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.758202 kubelet[1432]: E1213 03:56:34.758095 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.758202 kubelet[1432]: W1213 03:56:34.758105 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.758202 kubelet[1432]: E1213 03:56:34.758128 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.758501 kubelet[1432]: E1213 03:56:34.758290 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.758501 kubelet[1432]: W1213 03:56:34.758300 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.758501 kubelet[1432]: E1213 03:56:34.758310 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.758501 kubelet[1432]: E1213 03:56:34.758499 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.758501 kubelet[1432]: W1213 03:56:34.758508 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.758829 kubelet[1432]: E1213 03:56:34.758520 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.758829 kubelet[1432]: E1213 03:56:34.758676 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.758829 kubelet[1432]: W1213 03:56:34.758685 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.758829 kubelet[1432]: E1213 03:56:34.758694 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.759124 kubelet[1432]: E1213 03:56:34.758842 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.759124 kubelet[1432]: W1213 03:56:34.758853 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.759124 kubelet[1432]: E1213 03:56:34.758862 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.759124 kubelet[1432]: E1213 03:56:34.759013 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.759124 kubelet[1432]: W1213 03:56:34.759023 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.759124 kubelet[1432]: E1213 03:56:34.759032 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.759555 kubelet[1432]: E1213 03:56:34.759204 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.759555 kubelet[1432]: W1213 03:56:34.759214 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.759555 kubelet[1432]: E1213 03:56:34.759223 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.759555 kubelet[1432]: E1213 03:56:34.759375 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.759555 kubelet[1432]: W1213 03:56:34.759384 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.759555 kubelet[1432]: E1213 03:56:34.759394 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.759555 kubelet[1432]: E1213 03:56:34.759547 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.759555 kubelet[1432]: W1213 03:56:34.759557 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.759555 kubelet[1432]: E1213 03:56:34.759567 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.760099 kubelet[1432]: E1213 03:56:34.759722 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.760099 kubelet[1432]: W1213 03:56:34.759732 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.760099 kubelet[1432]: E1213 03:56:34.759743 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.760099 kubelet[1432]: E1213 03:56:34.759909 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.760099 kubelet[1432]: W1213 03:56:34.759919 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.760099 kubelet[1432]: E1213 03:56:34.759928 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.760099 kubelet[1432]: E1213 03:56:34.760094 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.760099 kubelet[1432]: W1213 03:56:34.760104 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760116 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760269 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.760779 kubelet[1432]: W1213 03:56:34.760279 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760292 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760465 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.760779 kubelet[1432]: W1213 03:56:34.760475 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760484 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760650 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.760779 kubelet[1432]: W1213 03:56:34.760660 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.760779 kubelet[1432]: E1213 03:56:34.760668 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.760815 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.761499 kubelet[1432]: W1213 03:56:34.760825 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.760835 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.760977 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.761499 kubelet[1432]: W1213 03:56:34.760987 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.760996 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.761138 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.761499 kubelet[1432]: W1213 03:56:34.761147 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.761157 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.761499 kubelet[1432]: E1213 03:56:34.761366 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762126 kubelet[1432]: W1213 03:56:34.761375 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762126 kubelet[1432]: E1213 03:56:34.761385 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.762126 kubelet[1432]: E1213 03:56:34.761561 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762126 kubelet[1432]: W1213 03:56:34.761571 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762126 kubelet[1432]: E1213 03:56:34.761581 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.762126 kubelet[1432]: E1213 03:56:34.761756 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762126 kubelet[1432]: W1213 03:56:34.761765 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762126 kubelet[1432]: E1213 03:56:34.761774 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.762126 kubelet[1432]: E1213 03:56:34.761921 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762126 kubelet[1432]: W1213 03:56:34.761930 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.761939 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.762081 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762957 kubelet[1432]: W1213 03:56:34.762091 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.762099 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.762266 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762957 kubelet[1432]: W1213 03:56:34.762276 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.762285 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.762589 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.762957 kubelet[1432]: W1213 03:56:34.762612 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.762957 kubelet[1432]: E1213 03:56:34.762626 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.763957 kubelet[1432]: E1213 03:56:34.762770 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.763957 kubelet[1432]: W1213 03:56:34.762780 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.763957 kubelet[1432]: E1213 03:56:34.762789 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.763957 kubelet[1432]: E1213 03:56:34.762941 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.763957 kubelet[1432]: W1213 03:56:34.762950 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.763957 kubelet[1432]: E1213 03:56:34.762960 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.764495 kubelet[1432]: E1213 03:56:34.764460 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.764495 kubelet[1432]: W1213 03:56:34.764478 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.764495 kubelet[1432]: E1213 03:56:34.764491 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.764872 kubelet[1432]: E1213 03:56:34.764676 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.764872 kubelet[1432]: W1213 03:56:34.764685 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.764872 kubelet[1432]: E1213 03:56:34.764695 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.766698 kubelet[1432]: E1213 03:56:34.766540 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:56:34.766698 kubelet[1432]: W1213 03:56:34.766584 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:56:34.766698 kubelet[1432]: E1213 03:56:34.766625 1432 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:56:34.949916 env[1148]: time="2024-12-13T03:56:34.948385490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:34.952472 env[1148]: time="2024-12-13T03:56:34.951537794Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:34.955131 env[1148]: time="2024-12-13T03:56:34.955050758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:34.958623 env[1148]: time="2024-12-13T03:56:34.958557810Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:34.960232 env[1148]: time="2024-12-13T03:56:34.960164990Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 03:56:34.964472 env[1148]: time="2024-12-13T03:56:34.964416437Z" level=info msg="CreateContainer within sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:56:34.988793 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount286500601.mount: Deactivated successfully. Dec 13 03:56:34.998083 env[1148]: time="2024-12-13T03:56:34.998006071Z" level=info msg="CreateContainer within sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\"" Dec 13 03:56:35.000192 env[1148]: time="2024-12-13T03:56:35.000140415Z" level=info msg="StartContainer for \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\"" Dec 13 03:56:35.032561 systemd[1]: Started cri-containerd-4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec.scope. Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fd7204d5698 items=0 ppid=1493 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:35.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465656536303438396261326539633362363664623137653534353161 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.052000 audit: BPF prog-id=69 op=LOAD Dec 13 03:56:35.052000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003ba958 items=0 ppid=1493 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:35.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465656536303438396261326539633362363664623137653534353161 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit: BPF prog-id=70 op=LOAD Dec 13 03:56:35.053000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003ba9a8 items=0 ppid=1493 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:35.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465656536303438396261326539633362363664623137653534353161 Dec 13 03:56:35.053000 audit: BPF prog-id=70 op=UNLOAD Dec 13 03:56:35.053000 audit: BPF prog-id=69 op=UNLOAD Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:35.053000 audit: BPF prog-id=71 op=LOAD Dec 13 03:56:35.053000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003baa38 items=0 ppid=1493 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:35.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465656536303438396261326539633362363664623137653534353161 Dec 13 03:56:35.075690 env[1148]: time="2024-12-13T03:56:35.075496123Z" level=info msg="StartContainer for \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\" returns successfully" Dec 13 03:56:35.082411 systemd[1]: cri-containerd-4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec.scope: Deactivated successfully. Dec 13 03:56:35.085000 audit: BPF prog-id=71 op=UNLOAD Dec 13 03:56:35.441496 kubelet[1432]: E1213 03:56:35.441318 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:35.629999 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec-rootfs.mount: Deactivated successfully. Dec 13 03:56:35.901256 env[1148]: time="2024-12-13T03:56:35.900517664Z" level=info msg="shim disconnected" id=4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec Dec 13 03:56:35.901256 env[1148]: time="2024-12-13T03:56:35.900620598Z" level=warning msg="cleaning up after shim disconnected" id=4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec namespace=k8s.io Dec 13 03:56:35.901256 env[1148]: time="2024-12-13T03:56:35.900653750Z" level=info msg="cleaning up dead shim" Dec 13 03:56:35.922016 env[1148]: time="2024-12-13T03:56:35.921907401Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:56:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1839 runtime=io.containerd.runc.v2\n" Dec 13 03:56:36.223153 update_engine[1141]: I1213 03:56:36.223026 1141 update_attempter.cc:509] Updating boot flags... Dec 13 03:56:36.442701 kubelet[1432]: E1213 03:56:36.442639 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:36.687100 kubelet[1432]: E1213 03:56:36.686955 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:36.727184 env[1148]: time="2024-12-13T03:56:36.727121301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 03:56:36.740046 kubelet[1432]: I1213 03:56:36.739929 1432 topology_manager.go:215] "Topology Admit Handler" podUID="4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf" podNamespace="calico-system" podName="calico-typha-8459c47689-6cbh4" Dec 13 03:56:36.753023 systemd[1]: Created slice kubepods-besteffort-pod4aa59af3_c6da_4c60_86e3_6bb0fa15dcdf.slice. Dec 13 03:56:36.833000 audit[1865]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.836129 kernel: kauditd_printk_skb: 344 callbacks suppressed Dec 13 03:56:36.836226 kernel: audit: type=1325 audit(1734062196.833:534): table=filter:65 family=2 entries=8 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.833000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc513d4890 a2=0 a3=7ffc513d487c items=0 ppid=1584 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.855666 kernel: audit: type=1300 audit(1734062196.833:534): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc513d4890 a2=0 a3=7ffc513d487c items=0 ppid=1584 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:36.862175 kernel: audit: type=1327 audit(1734062196.833:534): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:36.865000 audit[1865]: NETFILTER_CFG table=nat:66 family=2 entries=30 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.865000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc513d4890 a2=0 a3=7ffc513d487c items=0 ppid=1584 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.882648 kubelet[1432]: I1213 03:56:36.882587 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8szdz\" (UniqueName: \"kubernetes.io/projected/4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf-kube-api-access-8szdz\") pod \"calico-typha-8459c47689-6cbh4\" (UID: \"4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf\") " pod="calico-system/calico-typha-8459c47689-6cbh4" Dec 13 03:56:36.882966 kubelet[1432]: I1213 03:56:36.882930 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf-tigera-ca-bundle\") pod \"calico-typha-8459c47689-6cbh4\" (UID: \"4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf\") " pod="calico-system/calico-typha-8459c47689-6cbh4" Dec 13 03:56:36.883283 kubelet[1432]: I1213 03:56:36.883242 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf-typha-certs\") pod \"calico-typha-8459c47689-6cbh4\" (UID: \"4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf\") " pod="calico-system/calico-typha-8459c47689-6cbh4" Dec 13 03:56:36.885173 kernel: audit: type=1325 audit(1734062196.865:535): table=nat:66 family=2 entries=30 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.885283 kernel: audit: type=1300 audit(1734062196.865:535): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc513d4890 a2=0 a3=7ffc513d487c items=0 ppid=1584 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:36.893396 kernel: audit: type=1327 audit(1734062196.865:535): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:36.903000 audit[1868]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.903000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc7e3040a0 a2=0 a3=7ffc7e30408c items=0 ppid=1584 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.925620 kernel: audit: type=1325 audit(1734062196.903:536): table=filter:67 family=2 entries=8 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.925796 kernel: audit: type=1300 audit(1734062196.903:536): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc7e3040a0 a2=0 a3=7ffc7e30408c items=0 ppid=1584 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:36.933159 kernel: audit: type=1327 audit(1734062196.903:536): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:36.933420 kernel: audit: type=1325 audit(1734062196.927:537): table=nat:68 family=2 entries=30 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.927000 audit[1868]: NETFILTER_CFG table=nat:68 family=2 entries=30 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:36.927000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7e3040a0 a2=0 a3=7ffc7e30408c items=0 ppid=1584 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:36.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:37.071604 env[1148]: time="2024-12-13T03:56:37.071498695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8459c47689-6cbh4,Uid:4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf,Namespace:calico-system,Attempt:0,}" Dec 13 03:56:37.146405 env[1148]: time="2024-12-13T03:56:37.146227597Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:56:37.146697 env[1148]: time="2024-12-13T03:56:37.146318057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:56:37.146697 env[1148]: time="2024-12-13T03:56:37.146423876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:56:37.146890 env[1148]: time="2024-12-13T03:56:37.146669078Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/319e3c86208b4bf614a0916293df5c33bac0697199753f9d6df6e71d4b8ef1e2 pid=1879 runtime=io.containerd.runc.v2 Dec 13 03:56:37.194905 systemd[1]: Started cri-containerd-319e3c86208b4bf614a0916293df5c33bac0697199753f9d6df6e71d4b8ef1e2.scope. Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.214000 audit: BPF prog-id=72 op=LOAD Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1879 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:37.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331396533633836323038623462663631346130393136323933646635 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1879 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:37.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331396533633836323038623462663631346130393136323933646635 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.216000 audit: BPF prog-id=73 op=LOAD Dec 13 03:56:37.216000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000283050 items=0 ppid=1879 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:37.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331396533633836323038623462663631346130393136323933646635 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit: BPF prog-id=74 op=LOAD Dec 13 03:56:37.217000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000283098 items=0 ppid=1879 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:37.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331396533633836323038623462663631346130393136323933646635 Dec 13 03:56:37.217000 audit: BPF prog-id=74 op=UNLOAD Dec 13 03:56:37.217000 audit: BPF prog-id=73 op=UNLOAD Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:37.217000 audit: BPF prog-id=75 op=LOAD Dec 13 03:56:37.217000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002834a8 items=0 ppid=1879 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:37.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331396533633836323038623462663631346130393136323933646635 Dec 13 03:56:37.252752 env[1148]: time="2024-12-13T03:56:37.252680268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8459c47689-6cbh4,Uid:4aa59af3-c6da-4c60-86e3-6bb0fa15dcdf,Namespace:calico-system,Attempt:0,} returns sandbox id \"319e3c86208b4bf614a0916293df5c33bac0697199753f9d6df6e71d4b8ef1e2\"" Dec 13 03:56:37.444292 kubelet[1432]: E1213 03:56:37.444220 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:37.995406 systemd[1]: run-containerd-runc-k8s.io-319e3c86208b4bf614a0916293df5c33bac0697199753f9d6df6e71d4b8ef1e2-runc.1yb6xJ.mount: Deactivated successfully. Dec 13 03:56:38.445291 kubelet[1432]: E1213 03:56:38.445202 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:38.686361 kubelet[1432]: E1213 03:56:38.686203 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:39.445984 kubelet[1432]: E1213 03:56:39.445716 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:40.446429 kubelet[1432]: E1213 03:56:40.446266 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:40.686987 kubelet[1432]: E1213 03:56:40.686184 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:41.446833 kubelet[1432]: E1213 03:56:41.446791 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:42.245542 kernel: kauditd_printk_skb: 59 callbacks suppressed Dec 13 03:56:42.245827 kernel: audit: type=1325 audit(1734062202.242:556): table=filter:69 family=2 entries=9 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:42.242000 audit[1914]: NETFILTER_CFG table=filter:69 family=2 entries=9 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:42.242000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe8683ddd0 a2=0 a3=7ffe8683ddbc items=0 ppid=1584 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:42.252887 kernel: audit: type=1300 audit(1734062202.242:556): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe8683ddd0 a2=0 a3=7ffe8683ddbc items=0 ppid=1584 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:42.253000 kernel: audit: type=1327 audit(1734062202.242:556): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:42.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:42.258000 audit[1914]: NETFILTER_CFG table=nat:70 family=2 entries=27 op=nft_unregister_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:42.258000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffe8683ddd0 a2=0 a3=7ffe8683ddbc items=0 ppid=1584 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:42.267616 kernel: audit: type=1325 audit(1734062202.258:557): table=nat:70 family=2 entries=27 op=nft_unregister_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:42.267717 kernel: audit: type=1300 audit(1734062202.258:557): arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffe8683ddd0 a2=0 a3=7ffe8683ddbc items=0 ppid=1584 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:42.267805 kernel: audit: type=1327 audit(1734062202.258:557): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:42.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:42.447839 kubelet[1432]: E1213 03:56:42.447781 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:42.686062 kubelet[1432]: E1213 03:56:42.685983 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:43.448953 kubelet[1432]: E1213 03:56:43.448837 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:43.898424 env[1148]: time="2024-12-13T03:56:43.897903488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:43.902590 env[1148]: time="2024-12-13T03:56:43.902535101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:43.906494 env[1148]: time="2024-12-13T03:56:43.906410912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:43.909612 env[1148]: time="2024-12-13T03:56:43.909560997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:43.911138 env[1148]: time="2024-12-13T03:56:43.911003992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 03:56:43.915201 env[1148]: time="2024-12-13T03:56:43.915030756Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 03:56:43.917289 env[1148]: time="2024-12-13T03:56:43.917185089Z" level=info msg="CreateContainer within sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:56:43.950491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount784873564.mount: Deactivated successfully. Dec 13 03:56:43.957996 env[1148]: time="2024-12-13T03:56:43.957639669Z" level=info msg="CreateContainer within sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\"" Dec 13 03:56:43.959540 env[1148]: time="2024-12-13T03:56:43.959465233Z" level=info msg="StartContainer for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\"" Dec 13 03:56:44.011338 systemd[1]: Started cri-containerd-95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98.scope. Dec 13 03:56:44.028000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.028000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2b7f11b698 items=0 ppid=1493 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:44.041091 kernel: audit: type=1400 audit(1734062204.028:558): avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.041144 kernel: audit: type=1300 audit(1734062204.028:558): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2b7f11b698 items=0 ppid=1493 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:44.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616438663962303730646361346134366161336238303930653937 Dec 13 03:56:44.045850 kernel: audit: type=1327 audit(1734062204.028:558): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616438663962303730646361346134366161336238303930653937 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.049168 kernel: audit: type=1400 audit(1734062204.033:559): avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.033000 audit: BPF prog-id=76 op=LOAD Dec 13 03:56:44.033000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000354448 items=0 ppid=1493 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:44.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616438663962303730646361346134366161336238303930653937 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.040000 audit: BPF prog-id=77 op=LOAD Dec 13 03:56:44.040000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000354498 items=0 ppid=1493 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:44.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616438663962303730646361346134366161336238303930653937 Dec 13 03:56:44.045000 audit: BPF prog-id=77 op=UNLOAD Dec 13 03:56:44.045000 audit: BPF prog-id=76 op=UNLOAD Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:44.045000 audit: BPF prog-id=78 op=LOAD Dec 13 03:56:44.045000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000354528 items=0 ppid=1493 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:44.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616438663962303730646361346134366161336238303930653937 Dec 13 03:56:44.072782 env[1148]: time="2024-12-13T03:56:44.072744027Z" level=info msg="StartContainer for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" returns successfully" Dec 13 03:56:44.449737 kubelet[1432]: E1213 03:56:44.449661 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:44.686434 kubelet[1432]: E1213 03:56:44.685914 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:44.751695 env[1148]: time="2024-12-13T03:56:44.751572618Z" level=info msg="StopContainer for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" with timeout 5 (s)" Dec 13 03:56:44.752955 env[1148]: time="2024-12-13T03:56:44.752912147Z" level=info msg="Stop container \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" with signal terminated" Dec 13 03:56:44.776184 systemd[1]: cri-containerd-95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98.scope: Deactivated successfully. Dec 13 03:56:44.780000 audit: BPF prog-id=78 op=UNLOAD Dec 13 03:56:44.940448 systemd[1]: run-containerd-runc-k8s.io-95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98-runc.Y4dkrV.mount: Deactivated successfully. Dec 13 03:56:44.940668 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98-rootfs.mount: Deactivated successfully. Dec 13 03:56:45.429008 kubelet[1432]: E1213 03:56:45.428884 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:45.450856 kubelet[1432]: E1213 03:56:45.450680 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:46.421857 env[1148]: time="2024-12-13T03:56:46.421600375Z" level=info msg="shim disconnected" id=95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98 Dec 13 03:56:46.423023 env[1148]: time="2024-12-13T03:56:46.422872978Z" level=warning msg="cleaning up after shim disconnected" id=95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98 namespace=k8s.io Dec 13 03:56:46.423300 env[1148]: time="2024-12-13T03:56:46.423208590Z" level=info msg="cleaning up dead shim" Dec 13 03:56:46.445544 env[1148]: time="2024-12-13T03:56:46.445445767Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:56:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1971 runtime=io.containerd.runc.v2\n" Dec 13 03:56:46.451587 env[1148]: time="2024-12-13T03:56:46.451521301Z" level=info msg="StopContainer for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" returns successfully" Dec 13 03:56:46.451805 kubelet[1432]: E1213 03:56:46.451708 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:46.453857 env[1148]: time="2024-12-13T03:56:46.453803611Z" level=info msg="StopPodSandbox for \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\"" Dec 13 03:56:46.454287 env[1148]: time="2024-12-13T03:56:46.454240292Z" level=info msg="Container to stop \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 03:56:46.454542 env[1148]: time="2024-12-13T03:56:46.454488058Z" level=info msg="Container to stop \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 03:56:46.458715 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf-shm.mount: Deactivated successfully. Dec 13 03:56:46.473151 systemd[1]: cri-containerd-ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf.scope: Deactivated successfully. Dec 13 03:56:46.473000 audit: BPF prog-id=62 op=UNLOAD Dec 13 03:56:46.476000 audit: BPF prog-id=65 op=UNLOAD Dec 13 03:56:46.519755 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf-rootfs.mount: Deactivated successfully. Dec 13 03:56:46.533161 env[1148]: time="2024-12-13T03:56:46.533058881Z" level=info msg="shim disconnected" id=ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf Dec 13 03:56:46.533417 env[1148]: time="2024-12-13T03:56:46.533164460Z" level=warning msg="cleaning up after shim disconnected" id=ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf namespace=k8s.io Dec 13 03:56:46.533417 env[1148]: time="2024-12-13T03:56:46.533189717Z" level=info msg="cleaning up dead shim" Dec 13 03:56:46.554236 env[1148]: time="2024-12-13T03:56:46.554138293Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:56:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2003 runtime=io.containerd.runc.v2\n" Dec 13 03:56:46.554890 env[1148]: time="2024-12-13T03:56:46.554812270Z" level=info msg="TearDown network for sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" successfully" Dec 13 03:56:46.554890 env[1148]: time="2024-12-13T03:56:46.554872934Z" level=info msg="StopPodSandbox for \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" returns successfully" Dec 13 03:56:46.687681 kubelet[1432]: E1213 03:56:46.686931 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:46.759615 kubelet[1432]: I1213 03:56:46.758772 1432 scope.go:117] "RemoveContainer" containerID="95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98" Dec 13 03:56:46.761981 env[1148]: time="2024-12-13T03:56:46.761914627Z" level=info msg="RemoveContainer for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\"" Dec 13 03:56:46.763059 kubelet[1432]: I1213 03:56:46.762947 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-lib-calico\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763059 kubelet[1432]: I1213 03:56:46.763041 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/094ddb41-4172-4d20-b7e2-1e3534209d54-node-certs\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763332 kubelet[1432]: I1213 03:56:46.763160 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-lib-modules\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763332 kubelet[1432]: I1213 03:56:46.763236 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-flexvol-driver-host\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763332 kubelet[1432]: I1213 03:56:46.763291 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-net-dir\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763332 kubelet[1432]: I1213 03:56:46.763333 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-log-dir\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763706 kubelet[1432]: I1213 03:56:46.763421 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-run-calico\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763706 kubelet[1432]: I1213 03:56:46.763471 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/094ddb41-4172-4d20-b7e2-1e3534209d54-tigera-ca-bundle\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763706 kubelet[1432]: I1213 03:56:46.763511 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-bin-dir\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763706 kubelet[1432]: I1213 03:56:46.763621 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8mgxv\" (UniqueName: \"kubernetes.io/projected/094ddb41-4172-4d20-b7e2-1e3534209d54-kube-api-access-8mgxv\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.763706 kubelet[1432]: I1213 03:56:46.763669 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-xtables-lock\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.764040 kubelet[1432]: I1213 03:56:46.763732 1432 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-policysync\") pod \"094ddb41-4172-4d20-b7e2-1e3534209d54\" (UID: \"094ddb41-4172-4d20-b7e2-1e3534209d54\") " Dec 13 03:56:46.764040 kubelet[1432]: I1213 03:56:46.763886 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-policysync" (OuterVolumeSpecName: "policysync") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.764040 kubelet[1432]: I1213 03:56:46.763963 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.765416 kubelet[1432]: I1213 03:56:46.764313 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.765416 kubelet[1432]: I1213 03:56:46.764442 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.765416 kubelet[1432]: I1213 03:56:46.764487 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.765416 kubelet[1432]: I1213 03:56:46.764532 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.765416 kubelet[1432]: I1213 03:56:46.764568 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.765818 kubelet[1432]: I1213 03:56:46.765540 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.767415 kubelet[1432]: I1213 03:56:46.766406 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/094ddb41-4172-4d20-b7e2-1e3534209d54-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 03:56:46.767415 kubelet[1432]: I1213 03:56:46.766522 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:56:46.772478 env[1148]: time="2024-12-13T03:56:46.772411653Z" level=info msg="RemoveContainer for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" returns successfully" Dec 13 03:56:46.776252 systemd[1]: var-lib-kubelet-pods-094ddb41\x2d4172\x2d4d20\x2db7e2\x2d1e3534209d54-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 03:56:46.779171 kubelet[1432]: I1213 03:56:46.779086 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/094ddb41-4172-4d20-b7e2-1e3534209d54-node-certs" (OuterVolumeSpecName: "node-certs") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 03:56:46.779546 kubelet[1432]: I1213 03:56:46.779445 1432 scope.go:117] "RemoveContainer" containerID="4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec" Dec 13 03:56:46.782260 env[1148]: time="2024-12-13T03:56:46.782202791Z" level=info msg="RemoveContainer for \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\"" Dec 13 03:56:46.787520 systemd[1]: var-lib-kubelet-pods-094ddb41\x2d4172\x2d4d20\x2db7e2\x2d1e3534209d54-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8mgxv.mount: Deactivated successfully. Dec 13 03:56:46.790013 kubelet[1432]: I1213 03:56:46.789920 1432 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/094ddb41-4172-4d20-b7e2-1e3534209d54-kube-api-access-8mgxv" (OuterVolumeSpecName: "kube-api-access-8mgxv") pod "094ddb41-4172-4d20-b7e2-1e3534209d54" (UID: "094ddb41-4172-4d20-b7e2-1e3534209d54"). InnerVolumeSpecName "kube-api-access-8mgxv". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 03:56:46.792204 env[1148]: time="2024-12-13T03:56:46.792140235Z" level=info msg="RemoveContainer for \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\" returns successfully" Dec 13 03:56:46.792777 kubelet[1432]: I1213 03:56:46.792732 1432 scope.go:117] "RemoveContainer" containerID="95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98" Dec 13 03:56:46.793339 env[1148]: time="2024-12-13T03:56:46.793194577Z" level=error msg="ContainerStatus for \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\": not found" Dec 13 03:56:46.793829 kubelet[1432]: E1213 03:56:46.793770 1432 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\": not found" containerID="95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98" Dec 13 03:56:46.793954 kubelet[1432]: I1213 03:56:46.793842 1432 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98"} err="failed to get container status \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\": rpc error: code = NotFound desc = an error occurred when try to find container \"95ad8f9b070dca4a46aa3b8090e972edd79b3257994d5652a16d98754f169c98\": not found" Dec 13 03:56:46.793954 kubelet[1432]: I1213 03:56:46.793918 1432 scope.go:117] "RemoveContainer" containerID="4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec" Dec 13 03:56:46.794525 env[1148]: time="2024-12-13T03:56:46.794336445Z" level=error msg="ContainerStatus for \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\": not found" Dec 13 03:56:46.795012 kubelet[1432]: E1213 03:56:46.794940 1432 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\": not found" containerID="4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec" Dec 13 03:56:46.795175 kubelet[1432]: I1213 03:56:46.795004 1432 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec"} err="failed to get container status \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\": rpc error: code = NotFound desc = an error occurred when try to find container \"4eee60489ba2e9c3b66db17e5451a5ff1700897ba9b717f6d96358f96b5980ec\": not found" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864710 1432 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-log-dir\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864771 1432 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-run-calico\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864796 1432 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/094ddb41-4172-4d20-b7e2-1e3534209d54-tigera-ca-bundle\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864822 1432 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-net-dir\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864846 1432 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-8mgxv\" (UniqueName: \"kubernetes.io/projected/094ddb41-4172-4d20-b7e2-1e3534209d54-kube-api-access-8mgxv\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864871 1432 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-xtables-lock\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864893 1432 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-policysync\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865095 kubelet[1432]: I1213 03:56:46.864917 1432 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-cni-bin-dir\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865896 kubelet[1432]: I1213 03:56:46.864939 1432 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-var-lib-calico\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865896 kubelet[1432]: I1213 03:56:46.865011 1432 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/094ddb41-4172-4d20-b7e2-1e3534209d54-node-certs\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865896 kubelet[1432]: I1213 03:56:46.865034 1432 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-flexvol-driver-host\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:46.865896 kubelet[1432]: I1213 03:56:46.865056 1432 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/094ddb41-4172-4d20-b7e2-1e3534209d54-lib-modules\") on node \"172.24.4.138\" DevicePath \"\"" Dec 13 03:56:47.063055 systemd[1]: Removed slice kubepods-besteffort-pod094ddb41_4172_4d20_b7e2_1e3534209d54.slice. Dec 13 03:56:47.112626 kubelet[1432]: I1213 03:56:47.112539 1432 topology_manager.go:215] "Topology Admit Handler" podUID="68bcee8d-1446-470b-8cc9-d776288b5d46" podNamespace="calico-system" podName="calico-node-8bnt8" Dec 13 03:56:47.112810 kubelet[1432]: E1213 03:56:47.112640 1432 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="094ddb41-4172-4d20-b7e2-1e3534209d54" containerName="flexvol-driver" Dec 13 03:56:47.112810 kubelet[1432]: E1213 03:56:47.112663 1432 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="094ddb41-4172-4d20-b7e2-1e3534209d54" containerName="install-cni" Dec 13 03:56:47.112810 kubelet[1432]: I1213 03:56:47.112705 1432 memory_manager.go:354] "RemoveStaleState removing state" podUID="094ddb41-4172-4d20-b7e2-1e3534209d54" containerName="install-cni" Dec 13 03:56:47.120522 systemd[1]: Created slice kubepods-besteffort-pod68bcee8d_1446_470b_8cc9_d776288b5d46.slice. Dec 13 03:56:47.266519 kubelet[1432]: I1213 03:56:47.266452 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-policysync\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.266918 kubelet[1432]: I1213 03:56:47.266876 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-cni-bin-dir\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.267198 kubelet[1432]: I1213 03:56:47.267157 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/68bcee8d-1446-470b-8cc9-d776288b5d46-tigera-ca-bundle\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.267451 kubelet[1432]: I1213 03:56:47.267414 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-var-lib-calico\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.267662 kubelet[1432]: I1213 03:56:47.267629 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-cni-net-dir\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.267923 kubelet[1432]: I1213 03:56:47.267888 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-xtables-lock\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.268121 kubelet[1432]: I1213 03:56:47.268088 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-cni-log-dir\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.268326 kubelet[1432]: I1213 03:56:47.268293 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-lib-modules\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.268581 kubelet[1432]: I1213 03:56:47.268546 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/68bcee8d-1446-470b-8cc9-d776288b5d46-node-certs\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.268778 kubelet[1432]: I1213 03:56:47.268745 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-var-run-calico\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.268983 kubelet[1432]: I1213 03:56:47.268940 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/68bcee8d-1446-470b-8cc9-d776288b5d46-flexvol-driver-host\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.269618 kubelet[1432]: I1213 03:56:47.269481 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njtx5\" (UniqueName: \"kubernetes.io/projected/68bcee8d-1446-470b-8cc9-d776288b5d46-kube-api-access-njtx5\") pod \"calico-node-8bnt8\" (UID: \"68bcee8d-1446-470b-8cc9-d776288b5d46\") " pod="calico-system/calico-node-8bnt8" Dec 13 03:56:47.425955 env[1148]: time="2024-12-13T03:56:47.425202536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8bnt8,Uid:68bcee8d-1446-470b-8cc9-d776288b5d46,Namespace:calico-system,Attempt:0,}" Dec 13 03:56:47.452044 kubelet[1432]: E1213 03:56:47.451926 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:47.472608 env[1148]: time="2024-12-13T03:56:47.472478476Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:56:47.472608 env[1148]: time="2024-12-13T03:56:47.472536335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:56:47.472608 env[1148]: time="2024-12-13T03:56:47.472551274Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:56:47.473217 env[1148]: time="2024-12-13T03:56:47.473063817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1 pid=2027 runtime=io.containerd.runc.v2 Dec 13 03:56:47.516296 systemd[1]: run-containerd-runc-k8s.io-3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1-runc.YZYr58.mount: Deactivated successfully. Dec 13 03:56:47.520954 systemd[1]: Started cri-containerd-3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1.scope. Dec 13 03:56:47.542557 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 03:56:47.542710 kernel: audit: type=1400 audit(1734062207.534:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.542759 kernel: audit: type=1400 audit(1734062207.534:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.552267 kernel: audit: type=1400 audit(1734062207.534:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.552356 kernel: audit: type=1400 audit(1734062207.534:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.557429 kernel: audit: type=1400 audit(1734062207.534:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.562361 kernel: audit: type=1400 audit(1734062207.534:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.569544 kernel: audit: type=1400 audit(1734062207.534:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.573356 kernel: audit: type=1400 audit(1734062207.534:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.580582 kernel: audit: type=1400 audit(1734062207.534:575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.580626 kernel: audit: type=1400 audit(1734062207.538:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.538000 audit: BPF prog-id=79 op=LOAD Dec 13 03:56:47.542000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.542000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2027 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653066356631653333333736626162373366326531646461386238 Dec 13 03:56:47.542000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.542000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2027 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653066356631653333333736626162373366326531646461386238 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.543000 audit: BPF prog-id=80 op=LOAD Dec 13 03:56:47.543000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003900d0 items=0 ppid=2027 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653066356631653333333736626162373366326531646461386238 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit: BPF prog-id=81 op=LOAD Dec 13 03:56:47.544000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000390118 items=0 ppid=2027 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653066356631653333333736626162373366326531646461386238 Dec 13 03:56:47.544000 audit: BPF prog-id=81 op=UNLOAD Dec 13 03:56:47.544000 audit: BPF prog-id=80 op=UNLOAD Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.544000 audit: BPF prog-id=82 op=LOAD Dec 13 03:56:47.544000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000390528 items=0 ppid=2027 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653066356631653333333736626162373366326531646461386238 Dec 13 03:56:47.583857 env[1148]: time="2024-12-13T03:56:47.583812405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8bnt8,Uid:68bcee8d-1446-470b-8cc9-d776288b5d46,Namespace:calico-system,Attempt:0,} returns sandbox id \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\"" Dec 13 03:56:47.586632 env[1148]: time="2024-12-13T03:56:47.586599395Z" level=info msg="CreateContainer within sandbox \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:56:47.696025 kubelet[1432]: I1213 03:56:47.691939 1432 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="094ddb41-4172-4d20-b7e2-1e3534209d54" path="/var/lib/kubelet/pods/094ddb41-4172-4d20-b7e2-1e3534209d54/volumes" Dec 13 03:56:47.834007 env[1148]: time="2024-12-13T03:56:47.833868850Z" level=info msg="CreateContainer within sandbox \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1\"" Dec 13 03:56:47.835166 env[1148]: time="2024-12-13T03:56:47.835070288Z" level=info msg="StartContainer for \"f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1\"" Dec 13 03:56:47.886383 systemd[1]: Started cri-containerd-f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1.scope. Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9d5319fea8 items=0 ppid=2027 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346366356232613835366134393966303836633932333335656465 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.915000 audit: BPF prog-id=83 op=LOAD Dec 13 03:56:47.915000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000096eb8 items=0 ppid=2027 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346366356232613835366134393966303836633932333335656465 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.916000 audit: BPF prog-id=84 op=LOAD Dec 13 03:56:47.916000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000096f08 items=0 ppid=2027 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346366356232613835366134393966303836633932333335656465 Dec 13 03:56:47.917000 audit: BPF prog-id=84 op=UNLOAD Dec 13 03:56:47.917000 audit: BPF prog-id=83 op=UNLOAD Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:47.917000 audit: BPF prog-id=85 op=LOAD Dec 13 03:56:47.917000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000096f98 items=0 ppid=2027 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:47.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639346366356232613835366134393966303836633932333335656465 Dec 13 03:56:47.952695 env[1148]: time="2024-12-13T03:56:47.949851087Z" level=info msg="StartContainer for \"f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1\" returns successfully" Dec 13 03:56:47.959770 systemd[1]: cri-containerd-f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1.scope: Deactivated successfully. Dec 13 03:56:47.964000 audit: BPF prog-id=85 op=UNLOAD Dec 13 03:56:48.079506 env[1148]: time="2024-12-13T03:56:48.079380559Z" level=info msg="shim disconnected" id=f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1 Dec 13 03:56:48.080005 env[1148]: time="2024-12-13T03:56:48.079505032Z" level=warning msg="cleaning up after shim disconnected" id=f94cf5b2a856a499f086c92335ededa9717fa9c26d54f784c9a2d7bb872843c1 namespace=k8s.io Dec 13 03:56:48.080005 env[1148]: time="2024-12-13T03:56:48.079538044Z" level=info msg="cleaning up dead shim" Dec 13 03:56:48.111763 env[1148]: time="2024-12-13T03:56:48.111643509Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:56:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2110 runtime=io.containerd.runc.v2\n" Dec 13 03:56:48.452200 kubelet[1432]: E1213 03:56:48.452150 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:48.686973 kubelet[1432]: E1213 03:56:48.686813 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:48.779115 env[1148]: time="2024-12-13T03:56:48.778752781Z" level=info msg="CreateContainer within sandbox \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:56:48.816723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount140394429.mount: Deactivated successfully. Dec 13 03:56:48.835329 env[1148]: time="2024-12-13T03:56:48.834563561Z" level=info msg="CreateContainer within sandbox \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8\"" Dec 13 03:56:48.836193 env[1148]: time="2024-12-13T03:56:48.836140334Z" level=info msg="StartContainer for \"d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8\"" Dec 13 03:56:48.892869 systemd[1]: Started cri-containerd-d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8.scope. Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7d6c19e598 items=0 ppid=2027 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:48.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653437303235633634386338333365373031353336653638646261 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit: BPF prog-id=86 op=LOAD Dec 13 03:56:48.922000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000285d48 items=0 ppid=2027 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:48.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653437303235633634386338333365373031353336653638646261 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit: BPF prog-id=87 op=LOAD Dec 13 03:56:48.922000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000285d98 items=0 ppid=2027 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:48.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653437303235633634386338333365373031353336653638646261 Dec 13 03:56:48.922000 audit: BPF prog-id=87 op=UNLOAD Dec 13 03:56:48.922000 audit: BPF prog-id=86 op=UNLOAD Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:48.922000 audit: BPF prog-id=88 op=LOAD Dec 13 03:56:48.922000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000285e28 items=0 ppid=2027 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:48.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653437303235633634386338333365373031353336653638646261 Dec 13 03:56:48.960197 env[1148]: time="2024-12-13T03:56:48.960118429Z" level=info msg="StartContainer for \"d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8\" returns successfully" Dec 13 03:56:49.080690 env[1148]: time="2024-12-13T03:56:49.080536321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:49.084188 env[1148]: time="2024-12-13T03:56:49.084141446Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:49.088532 env[1148]: time="2024-12-13T03:56:49.088482163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:49.090964 env[1148]: time="2024-12-13T03:56:49.090924914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:56:49.091703 env[1148]: time="2024-12-13T03:56:49.091661509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 03:56:49.101650 env[1148]: time="2024-12-13T03:56:49.101604765Z" level=info msg="CreateContainer within sandbox \"319e3c86208b4bf614a0916293df5c33bac0697199753f9d6df6e71d4b8ef1e2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 03:56:49.132568 env[1148]: time="2024-12-13T03:56:49.132446786Z" level=info msg="CreateContainer within sandbox \"319e3c86208b4bf614a0916293df5c33bac0697199753f9d6df6e71d4b8ef1e2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"69a5c12ddecb772a192073a2b57ead786c51150bd99909ca4fad2cc7192cc274\"" Dec 13 03:56:49.133672 env[1148]: time="2024-12-13T03:56:49.133636663Z" level=info msg="StartContainer for \"69a5c12ddecb772a192073a2b57ead786c51150bd99909ca4fad2cc7192cc274\"" Dec 13 03:56:49.155794 systemd[1]: Started cri-containerd-69a5c12ddecb772a192073a2b57ead786c51150bd99909ca4fad2cc7192cc274.scope. Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.184000 audit: BPF prog-id=89 op=LOAD Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1879 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:49.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613563313264646563623737326131393230373361326235376561 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1879 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:49.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613563313264646563623737326131393230373361326235376561 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.185000 audit: BPF prog-id=90 op=LOAD Dec 13 03:56:49.185000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001abb40 items=0 ppid=1879 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:49.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613563313264646563623737326131393230373361326235376561 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.186000 audit: BPF prog-id=91 op=LOAD Dec 13 03:56:49.186000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001abb88 items=0 ppid=1879 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:49.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613563313264646563623737326131393230373361326235376561 Dec 13 03:56:49.187000 audit: BPF prog-id=91 op=UNLOAD Dec 13 03:56:49.187000 audit: BPF prog-id=90 op=UNLOAD Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:56:49.187000 audit: BPF prog-id=92 op=LOAD Dec 13 03:56:49.187000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001abf98 items=0 ppid=1879 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:49.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613563313264646563623737326131393230373361326235376561 Dec 13 03:56:49.223838 env[1148]: time="2024-12-13T03:56:49.223785300Z" level=info msg="StartContainer for \"69a5c12ddecb772a192073a2b57ead786c51150bd99909ca4fad2cc7192cc274\" returns successfully" Dec 13 03:56:49.452644 kubelet[1432]: E1213 03:56:49.452584 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:49.882545 kubelet[1432]: I1213 03:56:49.881471 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8459c47689-6cbh4" podStartSLOduration=2.042713539 podStartE2EDuration="13.881327872s" podCreationTimestamp="2024-12-13 03:56:36 +0000 UTC" firstStartedPulling="2024-12-13 03:56:37.25431143 +0000 UTC m=+13.244893906" lastFinishedPulling="2024-12-13 03:56:49.092925764 +0000 UTC m=+25.083508239" observedRunningTime="2024-12-13 03:56:49.879827122 +0000 UTC m=+25.870409647" watchObservedRunningTime="2024-12-13 03:56:49.881327872 +0000 UTC m=+25.871910398" Dec 13 03:56:50.453706 kubelet[1432]: E1213 03:56:50.453619 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:50.686375 kubelet[1432]: E1213 03:56:50.686270 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:50.731430 env[1148]: time="2024-12-13T03:56:50.731186885Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:56:50.737951 systemd[1]: cri-containerd-d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8.scope: Deactivated successfully. Dec 13 03:56:50.742000 audit: BPF prog-id=88 op=UNLOAD Dec 13 03:56:50.787771 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8-rootfs.mount: Deactivated successfully. Dec 13 03:56:50.799957 kubelet[1432]: I1213 03:56:50.799818 1432 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:56:51.230971 kubelet[1432]: I1213 03:56:50.819853 1432 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 03:56:51.333182 env[1148]: time="2024-12-13T03:56:51.332296990Z" level=info msg="shim disconnected" id=d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8 Dec 13 03:56:51.333182 env[1148]: time="2024-12-13T03:56:51.332440058Z" level=warning msg="cleaning up after shim disconnected" id=d1e47025c648c833e701536e68dba33aeabfcd0e4713eebaf14ca74239f12de8 namespace=k8s.io Dec 13 03:56:51.333182 env[1148]: time="2024-12-13T03:56:51.332464685Z" level=info msg="cleaning up dead shim" Dec 13 03:56:51.341000 audit[2221]: NETFILTER_CFG table=filter:71 family=2 entries=9 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:51.341000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc69875df0 a2=0 a3=7ffc69875ddc items=0 ppid=1584 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:51.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:51.347000 audit[2221]: NETFILTER_CFG table=nat:72 family=2 entries=27 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:56:51.347000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc69875df0 a2=0 a3=7ffc69875ddc items=0 ppid=1584 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:56:51.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:56:51.352104 env[1148]: time="2024-12-13T03:56:51.352027230Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:56:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2213 runtime=io.containerd.runc.v2\n" Dec 13 03:56:51.454893 kubelet[1432]: E1213 03:56:51.454796 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:51.813135 env[1148]: time="2024-12-13T03:56:51.813030947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 03:56:52.455622 kubelet[1432]: E1213 03:56:52.455507 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:52.702453 systemd[1]: Created slice kubepods-besteffort-pod3248c8fa_ef89_40b6_a6ff_86c801d74517.slice. Dec 13 03:56:52.708462 env[1148]: time="2024-12-13T03:56:52.708011117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z7q9m,Uid:3248c8fa-ef89-40b6-a6ff-86c801d74517,Namespace:calico-system,Attempt:0,}" Dec 13 03:56:52.877547 env[1148]: time="2024-12-13T03:56:52.877390861Z" level=error msg="Failed to destroy network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:52.882992 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c-shm.mount: Deactivated successfully. Dec 13 03:56:52.885454 env[1148]: time="2024-12-13T03:56:52.885317512Z" level=error msg="encountered an error cleaning up failed sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:52.885746 env[1148]: time="2024-12-13T03:56:52.885672168Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z7q9m,Uid:3248c8fa-ef89-40b6-a6ff-86c801d74517,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:52.886310 kubelet[1432]: E1213 03:56:52.886225 1432 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:52.886310 kubelet[1432]: E1213 03:56:52.886361 1432 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:52.886310 kubelet[1432]: E1213 03:56:52.886388 1432 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-z7q9m" Dec 13 03:56:52.887811 kubelet[1432]: E1213 03:56:52.886457 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-z7q9m_calico-system(3248c8fa-ef89-40b6-a6ff-86c801d74517)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-z7q9m_calico-system(3248c8fa-ef89-40b6-a6ff-86c801d74517)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:53.456677 kubelet[1432]: E1213 03:56:53.456589 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:53.819974 kubelet[1432]: I1213 03:56:53.818017 1432 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:56:53.821041 env[1148]: time="2024-12-13T03:56:53.820956409Z" level=info msg="StopPodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\"" Dec 13 03:56:53.912361 env[1148]: time="2024-12-13T03:56:53.912256601Z" level=error msg="StopPodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" failed" error="failed to destroy network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:53.913089 kubelet[1432]: E1213 03:56:53.912910 1432 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:56:53.913089 kubelet[1432]: E1213 03:56:53.912971 1432 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c"} Dec 13 03:56:53.913089 kubelet[1432]: E1213 03:56:53.913017 1432 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3248c8fa-ef89-40b6-a6ff-86c801d74517\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:56:53.913089 kubelet[1432]: E1213 03:56:53.913049 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3248c8fa-ef89-40b6-a6ff-86c801d74517\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-z7q9m" podUID="3248c8fa-ef89-40b6-a6ff-86c801d74517" Dec 13 03:56:54.457539 kubelet[1432]: E1213 03:56:54.457425 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:55.124674 kubelet[1432]: I1213 03:56:55.123678 1432 topology_manager.go:215] "Topology Admit Handler" podUID="3d3fe8b3-4c44-4a7e-8895-548b731fcb36" podNamespace="default" podName="nginx-deployment-85f456d6dd-c4lc4" Dec 13 03:56:55.149858 systemd[1]: Created slice kubepods-besteffort-pod3d3fe8b3_4c44_4a7e_8895_548b731fcb36.slice. Dec 13 03:56:55.236702 kubelet[1432]: I1213 03:56:55.236581 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5hjb\" (UniqueName: \"kubernetes.io/projected/3d3fe8b3-4c44-4a7e-8895-548b731fcb36-kube-api-access-d5hjb\") pod \"nginx-deployment-85f456d6dd-c4lc4\" (UID: \"3d3fe8b3-4c44-4a7e-8895-548b731fcb36\") " pod="default/nginx-deployment-85f456d6dd-c4lc4" Dec 13 03:56:55.459905 kubelet[1432]: E1213 03:56:55.459842 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:55.469256 env[1148]: time="2024-12-13T03:56:55.469182744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c4lc4,Uid:3d3fe8b3-4c44-4a7e-8895-548b731fcb36,Namespace:default,Attempt:0,}" Dec 13 03:56:56.461893 kubelet[1432]: E1213 03:56:56.461678 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:57.462555 kubelet[1432]: E1213 03:56:57.462487 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:57.928923 env[1148]: time="2024-12-13T03:56:57.928856056Z" level=error msg="Failed to destroy network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:57.931802 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca-shm.mount: Deactivated successfully. Dec 13 03:56:57.933925 env[1148]: time="2024-12-13T03:56:57.933880050Z" level=error msg="encountered an error cleaning up failed sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:57.934068 env[1148]: time="2024-12-13T03:56:57.934034720Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c4lc4,Uid:3d3fe8b3-4c44-4a7e-8895-548b731fcb36,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:57.935015 kubelet[1432]: E1213 03:56:57.934479 1432 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:57.935015 kubelet[1432]: E1213 03:56:57.934570 1432 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-c4lc4" Dec 13 03:56:57.935015 kubelet[1432]: E1213 03:56:57.934601 1432 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-c4lc4" Dec 13 03:56:57.935273 kubelet[1432]: E1213 03:56:57.934669 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-c4lc4_default(3d3fe8b3-4c44-4a7e-8895-548b731fcb36)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-c4lc4_default(3d3fe8b3-4c44-4a7e-8895-548b731fcb36)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-c4lc4" podUID="3d3fe8b3-4c44-4a7e-8895-548b731fcb36" Dec 13 03:56:58.463418 kubelet[1432]: E1213 03:56:58.463355 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:56:58.906978 kubelet[1432]: I1213 03:56:58.906713 1432 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:56:58.909070 env[1148]: time="2024-12-13T03:56:58.908997639Z" level=info msg="StopPodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\"" Dec 13 03:56:59.275001 env[1148]: time="2024-12-13T03:56:59.274900532Z" level=error msg="StopPodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" failed" error="failed to destroy network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:56:59.275453 kubelet[1432]: E1213 03:56:59.275295 1432 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:56:59.275509 kubelet[1432]: E1213 03:56:59.275443 1432 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca"} Dec 13 03:56:59.275543 kubelet[1432]: E1213 03:56:59.275512 1432 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d3fe8b3-4c44-4a7e-8895-548b731fcb36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:56:59.275627 kubelet[1432]: E1213 03:56:59.275558 1432 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d3fe8b3-4c44-4a7e-8895-548b731fcb36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-c4lc4" podUID="3d3fe8b3-4c44-4a7e-8895-548b731fcb36" Dec 13 03:56:59.464590 kubelet[1432]: E1213 03:56:59.464516 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:00.465367 kubelet[1432]: E1213 03:57:00.465310 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:01.469400 kubelet[1432]: E1213 03:57:01.465853 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:02.466432 kubelet[1432]: E1213 03:57:02.466380 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:03.467528 kubelet[1432]: E1213 03:57:03.467467 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:04.256946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2156371703.mount: Deactivated successfully. Dec 13 03:57:04.347066 env[1148]: time="2024-12-13T03:57:04.346975722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:04.352153 env[1148]: time="2024-12-13T03:57:04.352028366Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:04.356329 env[1148]: time="2024-12-13T03:57:04.356217008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:04.360978 env[1148]: time="2024-12-13T03:57:04.360861785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:04.362285 env[1148]: time="2024-12-13T03:57:04.362211448Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 03:57:04.405539 env[1148]: time="2024-12-13T03:57:04.404802349Z" level=info msg="CreateContainer within sandbox \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 03:57:04.469238 kubelet[1432]: E1213 03:57:04.467928 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:04.470240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3817682206.mount: Deactivated successfully. Dec 13 03:57:04.490750 env[1148]: time="2024-12-13T03:57:04.490668386Z" level=info msg="CreateContainer within sandbox \"3fe0f5f1e33376bab73f2e1dda8b8343e596767f5ba7c1cf955d6fab2e4eadf1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b\"" Dec 13 03:57:04.492011 env[1148]: time="2024-12-13T03:57:04.491942566Z" level=info msg="StartContainer for \"be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b\"" Dec 13 03:57:04.536722 systemd[1]: Started cri-containerd-be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b.scope. Dec 13 03:57:04.588537 kernel: kauditd_printk_skb: 198 callbacks suppressed Dec 13 03:57:04.588698 kernel: audit: type=1400 audit(1734062224.578:619): avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4bf83175f8 items=0 ppid=2027 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:04.594748 kernel: audit: type=1300 audit(1734062224.578:619): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4bf83175f8 items=0 ppid=2027 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:04.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265323135613632326233666633323038643436633561623637643737 Dec 13 03:57:04.600434 kernel: audit: type=1327 audit(1734062224.578:619): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265323135613632326233666633323038643436633561623637643737 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.605393 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.614479 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.614528 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.618268 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.625655 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.625711 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.630547 kernel: audit: type=1400 audit(1734062224.578:620): avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.578000 audit: BPF prog-id=93 op=LOAD Dec 13 03:57:04.578000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000214998 items=0 ppid=2027 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:04.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265323135613632326233666633323038643436633561623637643737 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit: BPF prog-id=94 op=LOAD Dec 13 03:57:04.588000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002149e8 items=0 ppid=2027 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:04.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265323135613632326233666633323038643436633561623637643737 Dec 13 03:57:04.588000 audit: BPF prog-id=94 op=UNLOAD Dec 13 03:57:04.588000 audit: BPF prog-id=93 op=UNLOAD Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:04.588000 audit: BPF prog-id=95 op=LOAD Dec 13 03:57:04.588000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000214a78 items=0 ppid=2027 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:04.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265323135613632326233666633323038643436633561623637643737 Dec 13 03:57:04.636472 env[1148]: time="2024-12-13T03:57:04.636420665Z" level=info msg="StartContainer for \"be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b\" returns successfully" Dec 13 03:57:04.723745 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 03:57:04.724185 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 03:57:04.970922 kubelet[1432]: I1213 03:57:04.970835 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-8bnt8" podStartSLOduration=5.417487506 podStartE2EDuration="17.97081279s" podCreationTimestamp="2024-12-13 03:56:47 +0000 UTC" firstStartedPulling="2024-12-13 03:56:51.811816736 +0000 UTC m=+27.802399261" lastFinishedPulling="2024-12-13 03:57:04.365141969 +0000 UTC m=+40.355724545" observedRunningTime="2024-12-13 03:57:04.97000298 +0000 UTC m=+40.960585485" watchObservedRunningTime="2024-12-13 03:57:04.97081279 +0000 UTC m=+40.961395275" Dec 13 03:57:05.429009 kubelet[1432]: E1213 03:57:05.428852 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:05.468710 kubelet[1432]: E1213 03:57:05.468639 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:06.298000 audit[2456]: AVC avc: denied { write } for pid=2456 comm="tee" name="fd" dev="proc" ino=20754 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.299000 audit[2450]: AVC avc: denied { write } for pid=2450 comm="tee" name="fd" dev="proc" ino=20757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.298000 audit[2456]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbe324a0a a2=241 a3=1b6 items=1 ppid=2425 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.298000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 03:57:06.298000 audit: PATH item=0 name="/dev/fd/63" inode=20745 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.298000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.299000 audit[2450]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4270fa0c a2=241 a3=1b6 items=1 ppid=2419 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.302000 audit[2458]: AVC avc: denied { write } for pid=2458 comm="tee" name="fd" dev="proc" ino=20006 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.299000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 03:57:06.299000 audit: PATH item=0 name="/dev/fd/63" inode=20738 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.299000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.303000 audit[2460]: AVC avc: denied { write } for pid=2460 comm="tee" name="fd" dev="proc" ino=20762 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.305000 audit[2467]: AVC avc: denied { write } for pid=2467 comm="tee" name="fd" dev="proc" ino=20765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.306000 audit[2464]: AVC avc: denied { write } for pid=2464 comm="tee" name="fd" dev="proc" ino=20768 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.302000 audit[2458]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1075ba0a a2=241 a3=1b6 items=1 ppid=2420 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.302000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 03:57:06.302000 audit: PATH item=0 name="/dev/fd/63" inode=19993 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.302000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.306000 audit[2464]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd87517a0b a2=241 a3=1b6 items=1 ppid=2431 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.306000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 03:57:06.306000 audit: PATH item=0 name="/dev/fd/63" inode=20001 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.303000 audit[2460]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6a9559fa a2=241 a3=1b6 items=1 ppid=2423 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.306000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.303000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 03:57:06.303000 audit: PATH item=0 name="/dev/fd/63" inode=19998 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.305000 audit[2467]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0f5269fb a2=241 a3=1b6 items=1 ppid=2426 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.305000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 03:57:06.305000 audit: PATH item=0 name="/dev/fd/63" inode=20751 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.305000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.315000 audit[2478]: AVC avc: denied { write } for pid=2478 comm="tee" name="fd" dev="proc" ino=20775 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:57:06.315000 audit[2478]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5fc40a0a a2=241 a3=1b6 items=1 ppid=2429 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.315000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 03:57:06.315000 audit: PATH item=0 name="/dev/fd/63" inode=20010 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:57:06.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:57:06.469470 kubelet[1432]: E1213 03:57:06.469422 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.645000 audit: BPF prog-id=96 op=LOAD Dec 13 03:57:06.645000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf6c07200 a2=98 a3=3 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.645000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.646000 audit: BPF prog-id=96 op=UNLOAD Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.646000 audit: BPF prog-id=97 op=LOAD Dec 13 03:57:06.646000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf6c06fe0 a2=74 a3=540051 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.646000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.647000 audit: BPF prog-id=97 op=UNLOAD Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.647000 audit: BPF prog-id=98 op=LOAD Dec 13 03:57:06.647000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf6c07010 a2=94 a3=2 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.647000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.648000 audit: BPF prog-id=98 op=UNLOAD Dec 13 03:57:06.688162 env[1148]: time="2024-12-13T03:57:06.688096949Z" level=info msg="StopPodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\"" Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.784000 audit: BPF prog-id=99 op=LOAD Dec 13 03:57:06.784000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf6c06ed0 a2=40 a3=1 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.785000 audit: BPF prog-id=99 op=UNLOAD Dec 13 03:57:06.785000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.785000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcf6c06fa0 a2=50 a3=7ffcf6c07080 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.795000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.795000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf6c06ee0 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.795000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.795000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.795000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf6c06f10 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.795000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.795000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.795000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf6c06e20 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.795000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.795000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.795000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf6c06f30 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.795000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.796000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.796000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf6c06f10 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.796000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.796000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf6c06f00 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.796000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.796000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf6c06f30 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.796000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.796000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf6c06f10 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.796000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.796000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf6c06f30 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.796000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.796000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf6c06f00 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf6c06f70 a2=28 a3=0 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.797000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcf6c06d20 a2=50 a3=1 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.797000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.797000 audit: BPF prog-id=100 op=LOAD Dec 13 03:57:06.797000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcf6c06d20 a2=94 a3=5 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.797000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.798000 audit: BPF prog-id=100 op=UNLOAD Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcf6c06dd0 a2=50 a3=1 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcf6c06ef0 a2=4 a3=38 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.798000 audit[2529]: AVC avc: denied { confidentiality } for pid=2529 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:57:06.798000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf6c06f40 a2=94 a3=6 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { confidentiality } for pid=2529 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:57:06.800000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf6c066f0 a2=94 a3=83 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.800000 audit[2529]: AVC avc: denied { confidentiality } for pid=2529 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:57:06.800000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf6c066f0 a2=94 a3=83 items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.813000 audit: BPF prog-id=101 op=LOAD Dec 13 03:57:06.813000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8012bfd0 a2=98 a3=1999999999999999 items=0 ppid=2427 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.813000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:57:06.814000 audit: BPF prog-id=101 op=UNLOAD Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit: BPF prog-id=102 op=LOAD Dec 13 03:57:06.815000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8012beb0 a2=74 a3=ffff items=0 ppid=2427 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.815000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:57:06.815000 audit: BPF prog-id=102 op=UNLOAD Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:06.815000 audit: BPF prog-id=103 op=LOAD Dec 13 03:57:06.815000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8012bef0 a2=40 a3=7ffe8012c0d0 items=0 ppid=2427 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:06.815000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:57:06.816000 audit: BPF prog-id=103 op=UNLOAD Dec 13 03:57:07.018423 systemd-networkd[973]: vxlan.calico: Link UP Dec 13 03:57:07.018434 systemd-networkd[973]: vxlan.calico: Gained carrier Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.100000 audit: BPF prog-id=104 op=LOAD Dec 13 03:57:07.100000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec08c5cb0 a2=98 a3=100 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.100000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.103000 audit: BPF prog-id=104 op=UNLOAD Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.104000 audit: BPF prog-id=105 op=LOAD Dec 13 03:57:07.104000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec08c5ac0 a2=74 a3=540051 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.107000 audit: BPF prog-id=105 op=UNLOAD Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit: BPF prog-id=106 op=LOAD Dec 13 03:57:07.107000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec08c5af0 a2=94 a3=2 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.107000 audit: BPF prog-id=106 op=UNLOAD Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec08c59c0 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec08c59f0 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.107000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.107000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec08c5900 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.108000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.108000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec08c5a10 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec08c59f0 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec08c59e0 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec08c5a10 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec08c59f0 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec08c5a10 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec08c59e0 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec08c5a50 a2=28 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.110000 audit: BPF prog-id=107 op=LOAD Dec 13 03:57:07.110000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec08c58c0 a2=40 a3=0 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.112000 audit: BPF prog-id=107 op=UNLOAD Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffec08c58b0 a2=50 a3=2800 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffec08c58b0 a2=50 a3=2800 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit: BPF prog-id=108 op=LOAD Dec 13 03:57:07.123000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec08c50d0 a2=94 a3=2 items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.123000 audit: BPF prog-id=108 op=UNLOAD Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.123000 audit: BPF prog-id=109 op=LOAD Dec 13 03:57:07.123000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec08c51d0 a2=94 a3=2d items=0 ppid=2427 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.128000 audit: BPF prog-id=110 op=LOAD Dec 13 03:57:07.128000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6c6a3320 a2=98 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.128000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.129000 audit: BPF prog-id=110 op=UNLOAD Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.130000 audit: BPF prog-id=111 op=LOAD Dec 13 03:57:07.130000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6c6a3100 a2=74 a3=540051 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.132000 audit: BPF prog-id=111 op=UNLOAD Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.132000 audit: BPF prog-id=112 op=LOAD Dec 13 03:57:07.132000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6c6a3130 a2=94 a3=2 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.133000 audit: BPF prog-id=112 op=UNLOAD Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit: BPF prog-id=113 op=LOAD Dec 13 03:57:07.288000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6c6a2ff0 a2=40 a3=1 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.288000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.288000 audit: BPF prog-id=113 op=UNLOAD Dec 13 03:57:07.288000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.288000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6c6a30c0 a2=50 a3=7ffd6c6a31a0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.288000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.303000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.303000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6c6a3000 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.303000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.304000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.304000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6c6a3030 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.304000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.304000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.304000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6c6a2f40 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.304000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.304000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.304000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6c6a3050 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.304000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.304000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.304000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6c6a3030 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.304000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.306000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.306000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6c6a3020 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.306000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.306000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6c6a3050 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6c6a3030 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6c6a3050 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6c6a3020 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6c6a3090 a2=28 a3=0 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6c6a2e40 a2=50 a3=1 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit: BPF prog-id=114 op=LOAD Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6c6a2e40 a2=94 a3=5 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit: BPF prog-id=114 op=UNLOAD Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6c6a2ef0 a2=50 a3=1 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd6c6a3010 a2=4 a3=38 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.307000 audit[2581]: AVC avc: denied { confidentiality } for pid=2581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:57:07.307000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6c6a3060 a2=94 a3=6 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.309000 audit[2581]: AVC avc: denied { confidentiality } for pid=2581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:57:07.309000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6c6a2810 a2=94 a3=83 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.309000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.310000 audit[2581]: AVC avc: denied { confidentiality } for pid=2581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:57:07.310000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6c6a2810 a2=94 a3=83 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.311000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.311000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6c6a4250 a2=10 a3=f0f1 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.311000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.311000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6c6a40f0 a2=10 a3=3 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.311000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.311000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6c6a4090 a2=10 a3=3 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.311000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:07.311000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6c6a4090 a2=10 a3=7 items=0 ppid=2427 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:57:07.321000 audit: BPF prog-id=109 op=UNLOAD Dec 13 03:57:07.471114 kubelet[1432]: E1213 03:57:07.470982 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:07.488000 audit[2603]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:07.488000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd326ef2f0 a2=0 a3=7ffd326ef2dc items=0 ppid=2427 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.488000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:07.545000 audit[2607]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:07.545000 audit[2607]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffa8e00250 a2=0 a3=7fffa8e0023c items=0 ppid=2427 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:07.565000 audit[2605]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2605 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:07.565000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdd60b4a60 a2=0 a3=7ffdd60b4a4c items=0 ppid=2427 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.565000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:07.592000 audit[2604]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:07.592000 audit[2604]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff7042c680 a2=0 a3=7fff7042c66c items=0 ppid=2427 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:07.592000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:08.183587 systemd-networkd[973]: vxlan.calico: Gained IPv6LL Dec 13 03:57:08.471963 kubelet[1432]: E1213 03:57:08.471449 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.061 [INFO][2544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.063 [INFO][2544] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" iface="eth0" netns="/var/run/netns/cni-47a101fc-5d52-8ea3-354c-350515718f94" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.063 [INFO][2544] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" iface="eth0" netns="/var/run/netns/cni-47a101fc-5d52-8ea3-354c-350515718f94" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.064 [INFO][2544] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" iface="eth0" netns="/var/run/netns/cni-47a101fc-5d52-8ea3-354c-350515718f94" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.064 [INFO][2544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.064 [INFO][2544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.489 [INFO][2616] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.493 [INFO][2616] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.493 [INFO][2616] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.544 [WARNING][2616] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.544 [INFO][2616] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.547 [INFO][2616] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:08.553300 env[1148]: 2024-12-13 03:57:08.550 [INFO][2544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:08.555408 env[1148]: time="2024-12-13T03:57:08.555311719Z" level=info msg="TearDown network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" successfully" Dec 13 03:57:08.555661 env[1148]: time="2024-12-13T03:57:08.555577016Z" level=info msg="StopPodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" returns successfully" Dec 13 03:57:08.557302 env[1148]: time="2024-12-13T03:57:08.557246449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z7q9m,Uid:3248c8fa-ef89-40b6-a6ff-86c801d74517,Namespace:calico-system,Attempt:1,}" Dec 13 03:57:08.560904 systemd[1]: run-netns-cni\x2d47a101fc\x2d5d52\x2d8ea3\x2d354c\x2d350515718f94.mount: Deactivated successfully. Dec 13 03:57:08.826631 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:57:08.826760 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5e725d9ef6a: link becomes ready Dec 13 03:57:08.833152 systemd-networkd[973]: cali5e725d9ef6a: Link UP Dec 13 03:57:08.833670 systemd-networkd[973]: cali5e725d9ef6a: Gained carrier Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.678 [INFO][2623] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.138-k8s-csi--node--driver--z7q9m-eth0 csi-node-driver- calico-system 3248c8fa-ef89-40b6-a6ff-86c801d74517 1297 0 2024-12-13 03:56:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.138 csi-node-driver-z7q9m eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5e725d9ef6a [] []}} ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.678 [INFO][2623] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.723 [INFO][2635] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" HandleID="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.747 [INFO][2635] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" HandleID="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e4160), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.138", "pod":"csi-node-driver-z7q9m", "timestamp":"2024-12-13 03:57:08.723433949 +0000 UTC"}, Hostname:"172.24.4.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.747 [INFO][2635] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.747 [INFO][2635] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.747 [INFO][2635] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.138' Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.752 [INFO][2635] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.766 [INFO][2635] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.776 [INFO][2635] ipam/ipam.go 489: Trying affinity for 192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.779 [INFO][2635] ipam/ipam.go 155: Attempting to load block cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.784 [INFO][2635] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.784 [INFO][2635] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.787 [INFO][2635] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326 Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.795 [INFO][2635] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.807 [INFO][2635] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.111.129/26] block=192.168.111.128/26 handle="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.807 [INFO][2635] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.111.129/26] handle="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" host="172.24.4.138" Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.807 [INFO][2635] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:08.855147 env[1148]: 2024-12-13 03:57:08.807 [INFO][2635] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.129/26] IPv6=[] ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" HandleID="k8s-pod-network.16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.857890 env[1148]: 2024-12-13 03:57:08.813 [INFO][2623] cni-plugin/k8s.go 386: Populated endpoint ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-csi--node--driver--z7q9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3248c8fa-ef89-40b6-a6ff-86c801d74517", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"", Pod:"csi-node-driver-z7q9m", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e725d9ef6a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:08.857890 env[1148]: 2024-12-13 03:57:08.814 [INFO][2623] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.111.129/32] ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.857890 env[1148]: 2024-12-13 03:57:08.814 [INFO][2623] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5e725d9ef6a ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.857890 env[1148]: 2024-12-13 03:57:08.827 [INFO][2623] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.857890 env[1148]: 2024-12-13 03:57:08.827 [INFO][2623] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-csi--node--driver--z7q9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3248c8fa-ef89-40b6-a6ff-86c801d74517", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326", Pod:"csi-node-driver-z7q9m", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e725d9ef6a", MAC:"22:c0:06:d5:ef:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:08.857890 env[1148]: 2024-12-13 03:57:08.848 [INFO][2623] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326" Namespace="calico-system" Pod="csi-node-driver-z7q9m" WorkloadEndpoint="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:08.886000 audit[2649]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_chain pid=2649 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:08.886000 audit[2649]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc031b7b90 a2=0 a3=7ffc031b7b7c items=0 ppid=2427 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:08.886000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:08.899138 env[1148]: time="2024-12-13T03:57:08.899041367Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:57:08.899324 env[1148]: time="2024-12-13T03:57:08.899117810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:57:08.899324 env[1148]: time="2024-12-13T03:57:08.899133219Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:57:08.899324 env[1148]: time="2024-12-13T03:57:08.899302828Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326 pid=2663 runtime=io.containerd.runc.v2 Dec 13 03:57:08.924241 systemd[1]: run-containerd-runc-k8s.io-16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326-runc.pxAhuV.mount: Deactivated successfully. Dec 13 03:57:08.930545 systemd[1]: Started cri-containerd-16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326.scope. Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.943000 audit: BPF prog-id=115 op=LOAD Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2663 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643735323863363830393361363033323032623961653764373638 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2663 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643735323863363830393361363033323032623961653764373638 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit: BPF prog-id=116 op=LOAD Dec 13 03:57:08.944000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000249ce0 items=0 ppid=2663 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643735323863363830393361363033323032623961653764373638 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit: BPF prog-id=117 op=LOAD Dec 13 03:57:08.944000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000249d28 items=0 ppid=2663 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643735323863363830393361363033323032623961653764373638 Dec 13 03:57:08.944000 audit: BPF prog-id=117 op=UNLOAD Dec 13 03:57:08.944000 audit: BPF prog-id=116 op=UNLOAD Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:08.944000 audit: BPF prog-id=118 op=LOAD Dec 13 03:57:08.944000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000332138 items=0 ppid=2663 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643735323863363830393361363033323032623961653764373638 Dec 13 03:57:08.958794 env[1148]: time="2024-12-13T03:57:08.958741481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z7q9m,Uid:3248c8fa-ef89-40b6-a6ff-86c801d74517,Namespace:calico-system,Attempt:1,} returns sandbox id \"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326\"" Dec 13 03:57:08.960716 env[1148]: time="2024-12-13T03:57:08.960692112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 03:57:09.471785 kubelet[1432]: E1213 03:57:09.471663 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:09.687983 env[1148]: time="2024-12-13T03:57:09.687909863Z" level=info msg="StopPodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\"" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.856 [INFO][2711] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.856 [INFO][2711] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" iface="eth0" netns="/var/run/netns/cni-e7a3d4da-f4bd-b4b0-984b-4cfc98691a86" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.856 [INFO][2711] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" iface="eth0" netns="/var/run/netns/cni-e7a3d4da-f4bd-b4b0-984b-4cfc98691a86" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.857 [INFO][2711] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" iface="eth0" netns="/var/run/netns/cni-e7a3d4da-f4bd-b4b0-984b-4cfc98691a86" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.857 [INFO][2711] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.857 [INFO][2711] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.949 [INFO][2718] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.949 [INFO][2718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:09.949 [INFO][2718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:10.066 [WARNING][2718] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:10.066 [INFO][2718] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:10.071 [INFO][2718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:10.076669 env[1148]: 2024-12-13 03:57:10.073 [INFO][2711] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:10.082684 systemd[1]: run-netns-cni\x2de7a3d4da\x2df4bd\x2db4b0\x2d984b\x2d4cfc98691a86.mount: Deactivated successfully. Dec 13 03:57:10.083445 env[1148]: time="2024-12-13T03:57:10.083310937Z" level=info msg="TearDown network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" successfully" Dec 13 03:57:10.083655 env[1148]: time="2024-12-13T03:57:10.083614045Z" level=info msg="StopPodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" returns successfully" Dec 13 03:57:10.086601 env[1148]: time="2024-12-13T03:57:10.085951541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c4lc4,Uid:3d3fe8b3-4c44-4a7e-8895-548b731fcb36,Namespace:default,Attempt:1,}" Dec 13 03:57:10.163777 systemd-networkd[973]: cali5e725d9ef6a: Gained IPv6LL Dec 13 03:57:10.473637 kubelet[1432]: E1213 03:57:10.473566 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:10.551763 systemd-networkd[973]: cali937f912960d: Link UP Dec 13 03:57:10.568308 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:57:10.574889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali937f912960d: link becomes ready Dec 13 03:57:10.581655 systemd-networkd[973]: cali937f912960d: Gained carrier Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.374 [INFO][2724] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0 nginx-deployment-85f456d6dd- default 3d3fe8b3-4c44-4a7e-8895-548b731fcb36 1306 0 2024-12-13 03:56:55 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.138 nginx-deployment-85f456d6dd-c4lc4 eth0 default [] [] [kns.default ksa.default.default] cali937f912960d [] []}} ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.374 [INFO][2724] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.461 [INFO][2736] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" HandleID="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.479 [INFO][2736] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" HandleID="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000143ae0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.138", "pod":"nginx-deployment-85f456d6dd-c4lc4", "timestamp":"2024-12-13 03:57:10.461926201 +0000 UTC"}, Hostname:"172.24.4.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.479 [INFO][2736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.479 [INFO][2736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.479 [INFO][2736] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.138' Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.482 [INFO][2736] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.491 [INFO][2736] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.500 [INFO][2736] ipam/ipam.go 489: Trying affinity for 192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.506 [INFO][2736] ipam/ipam.go 155: Attempting to load block cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.515 [INFO][2736] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.515 [INFO][2736] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.518 [INFO][2736] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0 Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.527 [INFO][2736] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.537 [INFO][2736] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.111.130/26] block=192.168.111.128/26 handle="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.538 [INFO][2736] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.111.130/26] handle="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" host="172.24.4.138" Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.538 [INFO][2736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:10.603108 env[1148]: 2024-12-13 03:57:10.538 [INFO][2736] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.130/26] IPv6=[] ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" HandleID="k8s-pod-network.32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.604874 env[1148]: 2024-12-13 03:57:10.543 [INFO][2724] cni-plugin/k8s.go 386: Populated endpoint ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3d3fe8b3-4c44-4a7e-8895-548b731fcb36", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-c4lc4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.111.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali937f912960d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:10.604874 env[1148]: 2024-12-13 03:57:10.543 [INFO][2724] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.111.130/32] ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.604874 env[1148]: 2024-12-13 03:57:10.543 [INFO][2724] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali937f912960d ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.604874 env[1148]: 2024-12-13 03:57:10.585 [INFO][2724] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.604874 env[1148]: 2024-12-13 03:57:10.586 [INFO][2724] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3d3fe8b3-4c44-4a7e-8895-548b731fcb36", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0", Pod:"nginx-deployment-85f456d6dd-c4lc4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.111.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali937f912960d", MAC:"1e:f8:be:b2:ce:13", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:10.604874 env[1148]: 2024-12-13 03:57:10.594 [INFO][2724] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0" Namespace="default" Pod="nginx-deployment-85f456d6dd-c4lc4" WorkloadEndpoint="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:10.623000 audit[2752]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:10.625938 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 03:57:10.626091 kernel: audit: type=1325 audit(1734062230.623:746): table=filter:78 family=2 entries=38 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:10.623000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe0abf59d0 a2=0 a3=7ffe0abf59bc items=0 ppid=2427 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.634651 kernel: audit: type=1300 audit(1734062230.623:746): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe0abf59d0 a2=0 a3=7ffe0abf59bc items=0 ppid=2427 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.623000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:10.638272 kernel: audit: type=1327 audit(1734062230.623:746): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:10.652511 env[1148]: time="2024-12-13T03:57:10.652416873Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:57:10.652820 env[1148]: time="2024-12-13T03:57:10.652794682Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:57:10.652922 env[1148]: time="2024-12-13T03:57:10.652899699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:57:10.653175 env[1148]: time="2024-12-13T03:57:10.653147684Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0 pid=2766 runtime=io.containerd.runc.v2 Dec 13 03:57:10.676550 systemd[1]: Started cri-containerd-32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0.scope. Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707195 kernel: audit: type=1400 audit(1734062230.696:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707590 kernel: audit: type=1400 audit(1734062230.696:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.714941 kernel: audit: type=1400 audit(1734062230.696:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.714993 kernel: audit: type=1400 audit(1734062230.696:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.718710 kernel: audit: type=1400 audit(1734062230.696:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.718760 kernel: audit: type=1400 audit(1734062230.696:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.725420 kernel: audit: type=1400 audit(1734062230.696:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.696000 audit: BPF prog-id=119 op=LOAD Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2766 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332643239643733313464336334363633643630386631313033373363 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2766 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332643239643733313464336334363633643630386631313033373363 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.700000 audit: BPF prog-id=120 op=LOAD Dec 13 03:57:10.700000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025110 items=0 ppid=2766 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332643239643733313464336334363633643630386631313033373363 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.706000 audit: BPF prog-id=121 op=LOAD Dec 13 03:57:10.706000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025158 items=0 ppid=2766 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332643239643733313464336334363633643630386631313033373363 Dec 13 03:57:10.707000 audit: BPF prog-id=121 op=UNLOAD Dec 13 03:57:10.707000 audit: BPF prog-id=120 op=UNLOAD Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:10.707000 audit: BPF prog-id=122 op=LOAD Dec 13 03:57:10.707000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025568 items=0 ppid=2766 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:10.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332643239643733313464336334363633643630386631313033373363 Dec 13 03:57:10.755381 env[1148]: time="2024-12-13T03:57:10.754822155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c4lc4,Uid:3d3fe8b3-4c44-4a7e-8895-548b731fcb36,Namespace:default,Attempt:1,} returns sandbox id \"32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0\"" Dec 13 03:57:11.082829 systemd[1]: run-containerd-runc-k8s.io-32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0-runc.Az5Ifg.mount: Deactivated successfully. Dec 13 03:57:11.356763 env[1148]: time="2024-12-13T03:57:11.356517874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:11.360826 env[1148]: time="2024-12-13T03:57:11.360738423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:11.365276 env[1148]: time="2024-12-13T03:57:11.365202059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:11.367419 env[1148]: time="2024-12-13T03:57:11.367267004Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:11.368934 env[1148]: time="2024-12-13T03:57:11.368874269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 03:57:11.373701 env[1148]: time="2024-12-13T03:57:11.373617830Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 03:57:11.376338 env[1148]: time="2024-12-13T03:57:11.376241994Z" level=info msg="CreateContainer within sandbox \"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 03:57:11.421479 env[1148]: time="2024-12-13T03:57:11.421402014Z" level=info msg="CreateContainer within sandbox \"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"68f145de3b25d7bf2cd3dda94827fdc4404bda1a9d213985f13ebc3ac0d3faee\"" Dec 13 03:57:11.423549 env[1148]: time="2024-12-13T03:57:11.423494108Z" level=info msg="StartContainer for \"68f145de3b25d7bf2cd3dda94827fdc4404bda1a9d213985f13ebc3ac0d3faee\"" Dec 13 03:57:11.424222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1708236473.mount: Deactivated successfully. Dec 13 03:57:11.463975 systemd[1]: Started cri-containerd-68f145de3b25d7bf2cd3dda94827fdc4404bda1a9d213985f13ebc3ac0d3faee.scope. Dec 13 03:57:11.474529 kubelet[1432]: E1213 03:57:11.474469 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f299a0a12f8 items=0 ppid=2663 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:11.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638663134356465336232356437626632636433646461393438323766 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.481000 audit: BPF prog-id=123 op=LOAD Dec 13 03:57:11.481000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024aa8 items=0 ppid=2663 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:11.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638663134356465336232356437626632636433646461393438323766 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.483000 audit: BPF prog-id=124 op=LOAD Dec 13 03:57:11.483000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024af8 items=0 ppid=2663 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:11.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638663134356465336232356437626632636433646461393438323766 Dec 13 03:57:11.484000 audit: BPF prog-id=124 op=UNLOAD Dec 13 03:57:11.484000 audit: BPF prog-id=123 op=UNLOAD Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:11.484000 audit: BPF prog-id=125 op=LOAD Dec 13 03:57:11.484000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024b88 items=0 ppid=2663 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:11.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638663134356465336232356437626632636433646461393438323766 Dec 13 03:57:11.510997 env[1148]: time="2024-12-13T03:57:11.510916540Z" level=info msg="StartContainer for \"68f145de3b25d7bf2cd3dda94827fdc4404bda1a9d213985f13ebc3ac0d3faee\" returns successfully" Dec 13 03:57:12.403952 systemd-networkd[973]: cali937f912960d: Gained IPv6LL Dec 13 03:57:12.475858 kubelet[1432]: E1213 03:57:12.475675 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:13.476894 kubelet[1432]: E1213 03:57:13.476830 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:14.477552 kubelet[1432]: E1213 03:57:14.477431 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:15.059655 kubelet[1432]: I1213 03:57:15.059580 1432 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:57:15.119516 systemd[1]: run-containerd-runc-k8s.io-be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b-runc.7DnzWv.mount: Deactivated successfully. Dec 13 03:57:15.263469 systemd[1]: run-containerd-runc-k8s.io-be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b-runc.tirXsa.mount: Deactivated successfully. Dec 13 03:57:15.477989 kubelet[1432]: E1213 03:57:15.477922 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:16.113057 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount144887771.mount: Deactivated successfully. Dec 13 03:57:16.478628 kubelet[1432]: E1213 03:57:16.478565 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:17.479106 kubelet[1432]: E1213 03:57:17.478979 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:18.479527 kubelet[1432]: E1213 03:57:18.479382 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:19.141211 env[1148]: time="2024-12-13T03:57:19.141129369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:19.144690 env[1148]: time="2024-12-13T03:57:19.144631509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:19.149143 env[1148]: time="2024-12-13T03:57:19.149068402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:19.154039 env[1148]: time="2024-12-13T03:57:19.153979166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:19.155910 env[1148]: time="2024-12-13T03:57:19.155856067Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 03:57:19.159801 env[1148]: time="2024-12-13T03:57:19.159741967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 03:57:19.161256 env[1148]: time="2024-12-13T03:57:19.161194121Z" level=info msg="CreateContainer within sandbox \"32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 03:57:19.480708 kubelet[1432]: E1213 03:57:19.480610 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:19.675257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount499944306.mount: Deactivated successfully. Dec 13 03:57:20.481236 kubelet[1432]: E1213 03:57:20.481089 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:20.525972 env[1148]: time="2024-12-13T03:57:20.525886272Z" level=info msg="CreateContainer within sandbox \"32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5edccca7aa3fb9bceb53bad0c8d1e277511d6774976dd856327fcee345e1220a\"" Dec 13 03:57:20.528784 env[1148]: time="2024-12-13T03:57:20.528677919Z" level=info msg="StartContainer for \"5edccca7aa3fb9bceb53bad0c8d1e277511d6774976dd856327fcee345e1220a\"" Dec 13 03:57:20.593007 systemd[1]: run-containerd-runc-k8s.io-5edccca7aa3fb9bceb53bad0c8d1e277511d6774976dd856327fcee345e1220a-runc.DKam3L.mount: Deactivated successfully. Dec 13 03:57:20.602057 systemd[1]: Started cri-containerd-5edccca7aa3fb9bceb53bad0c8d1e277511d6774976dd856327fcee345e1220a.scope. Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.620653 kernel: kauditd_printk_skb: 93 callbacks suppressed Dec 13 03:57:20.620729 kernel: audit: type=1400 audit(1734062240.618:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627031 kernel: audit: type=1400 audit(1734062240.618:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.637726 kernel: audit: type=1400 audit(1734062240.618:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.637866 kernel: audit: type=1400 audit(1734062240.618:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.645519 kernel: audit: type=1400 audit(1734062240.618:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.651374 kernel: audit: type=1400 audit(1734062240.618:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.659076 kernel: audit: type=1400 audit(1734062240.618:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.659169 kernel: audit: type=1400 audit(1734062240.618:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.667420 kernel: audit: type=1400 audit(1734062240.618:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.677043 env[1148]: time="2024-12-13T03:57:20.676994383Z" level=info msg="StartContainer for \"5edccca7aa3fb9bceb53bad0c8d1e277511d6774976dd856327fcee345e1220a\" returns successfully" Dec 13 03:57:20.677411 kernel: audit: type=1400 audit(1734062240.619:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.619000 audit: BPF prog-id=126 op=LOAD Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2766 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:20.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565646363636137616133666239626365623533626164306338643165 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2766 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:20.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565646363636137616133666239626365623533626164306338643165 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit: BPF prog-id=127 op=LOAD Dec 13 03:57:20.627000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dbbe0 items=0 ppid=2766 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:20.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565646363636137616133666239626365623533626164306338643165 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.627000 audit: BPF prog-id=128 op=LOAD Dec 13 03:57:20.627000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dbc28 items=0 ppid=2766 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:20.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565646363636137616133666239626365623533626164306338643165 Dec 13 03:57:20.627000 audit: BPF prog-id=128 op=UNLOAD Dec 13 03:57:20.627000 audit: BPF prog-id=127 op=UNLOAD Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:20.628000 audit: BPF prog-id=129 op=LOAD Dec 13 03:57:20.628000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032a038 items=0 ppid=2766 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:20.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565646363636137616133666239626365623533626164306338643165 Dec 13 03:57:21.481586 kubelet[1432]: E1213 03:57:21.481479 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:22.410400 env[1148]: time="2024-12-13T03:57:22.410193351Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:22.414334 env[1148]: time="2024-12-13T03:57:22.414284246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:22.416283 env[1148]: time="2024-12-13T03:57:22.416239885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:22.417990 env[1148]: time="2024-12-13T03:57:22.417948329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:22.418269 env[1148]: time="2024-12-13T03:57:22.418224478Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 03:57:22.430586 env[1148]: time="2024-12-13T03:57:22.430509193Z" level=info msg="CreateContainer within sandbox \"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 03:57:22.454232 env[1148]: time="2024-12-13T03:57:22.454152867Z" level=info msg="CreateContainer within sandbox \"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"af67bb70bf778c6e92433279c11367d970c178f94b0109a846727561beb974da\"" Dec 13 03:57:22.454990 env[1148]: time="2024-12-13T03:57:22.454950854Z" level=info msg="StartContainer for \"af67bb70bf778c6e92433279c11367d970c178f94b0109a846727561beb974da\"" Dec 13 03:57:22.482554 kubelet[1432]: E1213 03:57:22.482496 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:22.499605 systemd[1]: run-containerd-runc-k8s.io-af67bb70bf778c6e92433279c11367d970c178f94b0109a846727561beb974da-runc.TzLWc0.mount: Deactivated successfully. Dec 13 03:57:22.507014 systemd[1]: Started cri-containerd-af67bb70bf778c6e92433279c11367d970c178f94b0109a846727561beb974da.scope. Dec 13 03:57:22.526000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.526000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f09c4168c08 items=0 ppid=2663 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:22.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363762623730626637373863366539323433333237396331313336 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.527000 audit: BPF prog-id=130 op=LOAD Dec 13 03:57:22.527000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003d4528 items=0 ppid=2663 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:22.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363762623730626637373863366539323433333237396331313336 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.529000 audit: BPF prog-id=131 op=LOAD Dec 13 03:57:22.529000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003d4578 items=0 ppid=2663 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:22.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363762623730626637373863366539323433333237396331313336 Dec 13 03:57:22.530000 audit: BPF prog-id=131 op=UNLOAD Dec 13 03:57:22.530000 audit: BPF prog-id=130 op=UNLOAD Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:22.530000 audit: BPF prog-id=132 op=LOAD Dec 13 03:57:22.530000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003d4608 items=0 ppid=2663 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:22.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363762623730626637373863366539323433333237396331313336 Dec 13 03:57:22.555972 env[1148]: time="2024-12-13T03:57:22.553682470Z" level=info msg="StartContainer for \"af67bb70bf778c6e92433279c11367d970c178f94b0109a846727561beb974da\" returns successfully" Dec 13 03:57:22.622389 kubelet[1432]: I1213 03:57:22.622305 1432 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 03:57:22.622709 kubelet[1432]: I1213 03:57:22.622686 1432 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 03:57:23.124330 kubelet[1432]: I1213 03:57:23.124120 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-c4lc4" podStartSLOduration=19.721756915 podStartE2EDuration="28.124085014s" podCreationTimestamp="2024-12-13 03:56:55 +0000 UTC" firstStartedPulling="2024-12-13 03:57:10.756331948 +0000 UTC m=+46.746914423" lastFinishedPulling="2024-12-13 03:57:19.158660037 +0000 UTC m=+55.149242522" observedRunningTime="2024-12-13 03:57:21.093137751 +0000 UTC m=+57.083720276" watchObservedRunningTime="2024-12-13 03:57:23.124085014 +0000 UTC m=+59.114667540" Dec 13 03:57:23.124736 kubelet[1432]: I1213 03:57:23.124405 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-z7q9m" podStartSLOduration=44.664481093 podStartE2EDuration="58.124390527s" podCreationTimestamp="2024-12-13 03:56:25 +0000 UTC" firstStartedPulling="2024-12-13 03:57:08.960165263 +0000 UTC m=+44.950747739" lastFinishedPulling="2024-12-13 03:57:22.420074658 +0000 UTC m=+58.410657173" observedRunningTime="2024-12-13 03:57:23.123539711 +0000 UTC m=+59.114122286" watchObservedRunningTime="2024-12-13 03:57:23.124390527 +0000 UTC m=+59.114973053" Dec 13 03:57:23.483674 kubelet[1432]: E1213 03:57:23.483596 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:24.485712 kubelet[1432]: E1213 03:57:24.485583 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:25.429940 kubelet[1432]: E1213 03:57:25.429826 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:25.486627 kubelet[1432]: E1213 03:57:25.486520 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:25.524881 env[1148]: time="2024-12-13T03:57:25.524797125Z" level=info msg="StopPodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\"" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.644 [WARNING][2996] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-csi--node--driver--z7q9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3248c8fa-ef89-40b6-a6ff-86c801d74517", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326", Pod:"csi-node-driver-z7q9m", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e725d9ef6a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.645 [INFO][2996] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.645 [INFO][2996] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" iface="eth0" netns="" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.646 [INFO][2996] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.646 [INFO][2996] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.702 [INFO][3003] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.703 [INFO][3003] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.703 [INFO][3003] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.719 [WARNING][3003] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.719 [INFO][3003] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.722 [INFO][3003] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:25.727255 env[1148]: 2024-12-13 03:57:25.724 [INFO][2996] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.729051 env[1148]: time="2024-12-13T03:57:25.728979384Z" level=info msg="TearDown network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" successfully" Dec 13 03:57:25.729229 env[1148]: time="2024-12-13T03:57:25.729186964Z" level=info msg="StopPodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" returns successfully" Dec 13 03:57:25.730395 env[1148]: time="2024-12-13T03:57:25.730271849Z" level=info msg="RemovePodSandbox for \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\"" Dec 13 03:57:25.730602 env[1148]: time="2024-12-13T03:57:25.730381916Z" level=info msg="Forcibly stopping sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\"" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.801 [WARNING][3025] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-csi--node--driver--z7q9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3248c8fa-ef89-40b6-a6ff-86c801d74517", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"16d7528c68093a603202b9ae7d7687a7b295d72b1944f87d287d49c35fd2e326", Pod:"csi-node-driver-z7q9m", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.111.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e725d9ef6a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.802 [INFO][3025] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.802 [INFO][3025] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" iface="eth0" netns="" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.802 [INFO][3025] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.802 [INFO][3025] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.846 [INFO][3031] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.847 [INFO][3031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.847 [INFO][3031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.866 [WARNING][3031] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.866 [INFO][3031] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" HandleID="k8s-pod-network.d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Workload="172.24.4.138-k8s-csi--node--driver--z7q9m-eth0" Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.869 [INFO][3031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:25.872228 env[1148]: 2024-12-13 03:57:25.870 [INFO][3025] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c" Dec 13 03:57:25.873091 env[1148]: time="2024-12-13T03:57:25.873052177Z" level=info msg="TearDown network for sandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" successfully" Dec 13 03:57:25.877546 env[1148]: time="2024-12-13T03:57:25.877512734Z" level=info msg="RemovePodSandbox \"d8b57733198669f43bc4fec71458bf644bbd29844362433c5a894a064216088c\" returns successfully" Dec 13 03:57:25.878304 env[1148]: time="2024-12-13T03:57:25.878254035Z" level=info msg="StopPodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\"" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.932 [WARNING][3049] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3d3fe8b3-4c44-4a7e-8895-548b731fcb36", ResourceVersion:"1341", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0", Pod:"nginx-deployment-85f456d6dd-c4lc4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.111.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali937f912960d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.932 [INFO][3049] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.933 [INFO][3049] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" iface="eth0" netns="" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.933 [INFO][3049] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.933 [INFO][3049] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.978 [INFO][3055] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.979 [INFO][3055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:25.981 [INFO][3055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:26.000 [WARNING][3055] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:26.000 [INFO][3055] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:26.003 [INFO][3055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:26.007441 env[1148]: 2024-12-13 03:57:26.005 [INFO][3049] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.009832 env[1148]: time="2024-12-13T03:57:26.007404504Z" level=info msg="TearDown network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" successfully" Dec 13 03:57:26.009832 env[1148]: time="2024-12-13T03:57:26.009122226Z" level=info msg="StopPodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" returns successfully" Dec 13 03:57:26.010340 env[1148]: time="2024-12-13T03:57:26.010285729Z" level=info msg="RemovePodSandbox for \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\"" Dec 13 03:57:26.010467 env[1148]: time="2024-12-13T03:57:26.010366250Z" level=info msg="Forcibly stopping sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\"" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.088 [WARNING][3074] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3d3fe8b3-4c44-4a7e-8895-548b731fcb36", ResourceVersion:"1341", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 56, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"32d29d7314d3c4663d608f110373c9fefead2dbf6a32e780a9229b5fb42499e0", Pod:"nginx-deployment-85f456d6dd-c4lc4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.111.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali937f912960d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.089 [INFO][3074] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.089 [INFO][3074] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" iface="eth0" netns="" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.089 [INFO][3074] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.089 [INFO][3074] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.136 [INFO][3081] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.136 [INFO][3081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.137 [INFO][3081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.157 [WARNING][3081] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.157 [INFO][3081] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" HandleID="k8s-pod-network.1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Workload="172.24.4.138-k8s-nginx--deployment--85f456d6dd--c4lc4-eth0" Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.161 [INFO][3081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:26.167517 env[1148]: 2024-12-13 03:57:26.164 [INFO][3074] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca" Dec 13 03:57:26.169972 env[1148]: time="2024-12-13T03:57:26.167652305Z" level=info msg="TearDown network for sandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" successfully" Dec 13 03:57:26.172597 env[1148]: time="2024-12-13T03:57:26.172536347Z" level=info msg="RemovePodSandbox \"1bd5bfafd2fdc08f3a40d2901a835d6caaac09ac6d30a659ffc2a71485efe8ca\" returns successfully" Dec 13 03:57:26.173338 env[1148]: time="2024-12-13T03:57:26.173268430Z" level=info msg="StopPodSandbox for \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\"" Dec 13 03:57:26.173505 env[1148]: time="2024-12-13T03:57:26.173440382Z" level=info msg="TearDown network for sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" successfully" Dec 13 03:57:26.173580 env[1148]: time="2024-12-13T03:57:26.173509392Z" level=info msg="StopPodSandbox for \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" returns successfully" Dec 13 03:57:26.174330 env[1148]: time="2024-12-13T03:57:26.174263196Z" level=info msg="RemovePodSandbox for \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\"" Dec 13 03:57:26.174722 env[1148]: time="2024-12-13T03:57:26.174604786Z" level=info msg="Forcibly stopping sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\"" Dec 13 03:57:26.175084 env[1148]: time="2024-12-13T03:57:26.175015407Z" level=info msg="TearDown network for sandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" successfully" Dec 13 03:57:26.182767 env[1148]: time="2024-12-13T03:57:26.182568665Z" level=info msg="RemovePodSandbox \"ac1232a8a8192472f88225495b1ac4b9dc9b11b18516e8d22d121afa987961cf\" returns successfully" Dec 13 03:57:26.487317 kubelet[1432]: E1213 03:57:26.487231 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:27.488110 kubelet[1432]: E1213 03:57:27.488049 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:28.488815 kubelet[1432]: E1213 03:57:28.488756 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:29.490755 kubelet[1432]: E1213 03:57:29.490667 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:30.491797 kubelet[1432]: E1213 03:57:30.491716 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:31.492922 kubelet[1432]: E1213 03:57:31.492852 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:32.494599 kubelet[1432]: E1213 03:57:32.494526 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:33.496736 kubelet[1432]: E1213 03:57:33.496636 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:34.312000 audit[3099]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.315643 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 03:57:34.315791 kernel: audit: type=1325 audit(1734062254.312:795): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.312000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe481be1d0 a2=0 a3=7ffe481be1bc items=0 ppid=1584 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.336492 kernel: audit: type=1300 audit(1734062254.312:795): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe481be1d0 a2=0 a3=7ffe481be1bc items=0 ppid=1584 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.336711 kernel: audit: type=1327 audit(1734062254.312:795): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.344000 audit[3099]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.344000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe481be1d0 a2=0 a3=0 items=0 ppid=1584 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.355208 kernel: audit: type=1325 audit(1734062254.344:796): table=nat:80 family=2 entries=22 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.355323 kernel: audit: type=1300 audit(1734062254.344:796): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe481be1d0 a2=0 a3=0 items=0 ppid=1584 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.355437 kernel: audit: type=1327 audit(1734062254.344:796): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.374000 audit[3101]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.374000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe4d51c640 a2=0 a3=7ffe4d51c62c items=0 ppid=1584 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.384403 kernel: audit: type=1325 audit(1734062254.374:797): table=filter:81 family=2 entries=32 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.384544 kernel: audit: type=1300 audit(1734062254.374:797): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe4d51c640 a2=0 a3=7ffe4d51c62c items=0 ppid=1584 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.384606 kernel: audit: type=1327 audit(1734062254.374:797): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.390000 audit[3101]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.394518 kernel: audit: type=1325 audit(1734062254.390:798): table=nat:82 family=2 entries=22 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:34.394596 kubelet[1432]: I1213 03:57:34.391622 1432 topology_manager.go:215] "Topology Admit Handler" podUID="99b93c78-cee1-4e9b-9a41-29efb0d3f1b3" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 03:57:34.390000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe4d51c640 a2=0 a3=0 items=0 ppid=1584 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:34.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:34.402170 systemd[1]: Created slice kubepods-besteffort-pod99b93c78_cee1_4e9b_9a41_29efb0d3f1b3.slice. Dec 13 03:57:34.497615 kubelet[1432]: E1213 03:57:34.497558 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:34.589946 kubelet[1432]: I1213 03:57:34.589623 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/99b93c78-cee1-4e9b-9a41-29efb0d3f1b3-data\") pod \"nfs-server-provisioner-0\" (UID: \"99b93c78-cee1-4e9b-9a41-29efb0d3f1b3\") " pod="default/nfs-server-provisioner-0" Dec 13 03:57:34.589946 kubelet[1432]: I1213 03:57:34.589864 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h5mmv\" (UniqueName: \"kubernetes.io/projected/99b93c78-cee1-4e9b-9a41-29efb0d3f1b3-kube-api-access-h5mmv\") pod \"nfs-server-provisioner-0\" (UID: \"99b93c78-cee1-4e9b-9a41-29efb0d3f1b3\") " pod="default/nfs-server-provisioner-0" Dec 13 03:57:35.007062 env[1148]: time="2024-12-13T03:57:35.006719868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:99b93c78-cee1-4e9b-9a41-29efb0d3f1b3,Namespace:default,Attempt:0,}" Dec 13 03:57:35.332097 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:57:35.341394 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 03:57:35.326577 systemd-networkd[973]: cali60e51b789ff: Link UP Dec 13 03:57:35.338217 systemd-networkd[973]: cali60e51b789ff: Gained carrier Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.119 [INFO][3104] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.138-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 99b93c78-cee1-4e9b-9a41-29efb0d3f1b3 1396 0 2024-12-13 03:57:34 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.138 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.120 [INFO][3104] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.190 [INFO][3114] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" HandleID="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Workload="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.238 [INFO][3114] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" HandleID="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Workload="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a210), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.138", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 03:57:35.190126998 +0000 UTC"}, Hostname:"172.24.4.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.238 [INFO][3114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.238 [INFO][3114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.238 [INFO][3114] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.138' Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.245 [INFO][3114] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.253 [INFO][3114] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.261 [INFO][3114] ipam/ipam.go 489: Trying affinity for 192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.265 [INFO][3114] ipam/ipam.go 155: Attempting to load block cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.269 [INFO][3114] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.269 [INFO][3114] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.272 [INFO][3114] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07 Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.282 [INFO][3114] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.315 [INFO][3114] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.111.131/26] block=192.168.111.128/26 handle="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.315 [INFO][3114] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.111.131/26] handle="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" host="172.24.4.138" Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.316 [INFO][3114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:57:35.375593 env[1148]: 2024-12-13 03:57:35.316 [INFO][3114] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.131/26] IPv6=[] ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" HandleID="k8s-pod-network.207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Workload="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.378490 env[1148]: 2024-12-13 03:57:35.319 [INFO][3104] cni-plugin/k8s.go 386: Populated endpoint ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"99b93c78-cee1-4e9b-9a41-29efb0d3f1b3", ResourceVersion:"1396", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 57, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.111.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:35.378490 env[1148]: 2024-12-13 03:57:35.320 [INFO][3104] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.111.131/32] ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.378490 env[1148]: 2024-12-13 03:57:35.320 [INFO][3104] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.378490 env[1148]: 2024-12-13 03:57:35.341 [INFO][3104] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.378949 env[1148]: 2024-12-13 03:57:35.343 [INFO][3104] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"99b93c78-cee1-4e9b-9a41-29efb0d3f1b3", ResourceVersion:"1396", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 57, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.111.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"c2:bd:4e:3b:4d:41", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:57:35.378949 env[1148]: 2024-12-13 03:57:35.366 [INFO][3104] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.138-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:57:35.399429 env[1148]: time="2024-12-13T03:57:35.399151610Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:57:35.399429 env[1148]: time="2024-12-13T03:57:35.399206623Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:57:35.399429 env[1148]: time="2024-12-13T03:57:35.399221442Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:57:35.399429 env[1148]: time="2024-12-13T03:57:35.399382245Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07 pid=3146 runtime=io.containerd.runc.v2 Dec 13 03:57:35.414000 audit[3142]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:57:35.414000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffdaf2486c0 a2=0 a3=7ffdaf2486ac items=0 ppid=2427 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:35.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:57:35.419879 systemd[1]: Started cri-containerd-207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07.scope. Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit: BPF prog-id=133 op=LOAD Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3146 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:35.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376236316338323634363639626532393738333339653932386266 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3146 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:35.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376236316338323634363639626532393738333339653932386266 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.449000 audit: BPF prog-id=134 op=LOAD Dec 13 03:57:35.449000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025210 items=0 ppid=3146 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:35.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376236316338323634363639626532393738333339653932386266 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.450000 audit: BPF prog-id=135 op=LOAD Dec 13 03:57:35.450000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025258 items=0 ppid=3146 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:35.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376236316338323634363639626532393738333339653932386266 Dec 13 03:57:35.450000 audit: BPF prog-id=135 op=UNLOAD Dec 13 03:57:35.451000 audit: BPF prog-id=134 op=UNLOAD Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { perfmon } for pid=3157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit[3157]: AVC avc: denied { bpf } for pid=3157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:35.451000 audit: BPF prog-id=136 op=LOAD Dec 13 03:57:35.451000 audit[3157]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025668 items=0 ppid=3146 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:35.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376236316338323634363639626532393738333339653932386266 Dec 13 03:57:35.484237 env[1148]: time="2024-12-13T03:57:35.484179067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:99b93c78-cee1-4e9b-9a41-29efb0d3f1b3,Namespace:default,Attempt:0,} returns sandbox id \"207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07\"" Dec 13 03:57:35.486304 env[1148]: time="2024-12-13T03:57:35.486039501Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 03:57:35.498688 kubelet[1432]: E1213 03:57:35.498621 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:35.725538 systemd[1]: run-containerd-runc-k8s.io-207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07-runc.Xv7hIr.mount: Deactivated successfully. Dec 13 03:57:36.499602 kubelet[1432]: E1213 03:57:36.499512 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:37.044176 systemd-networkd[973]: cali60e51b789ff: Gained IPv6LL Dec 13 03:57:37.500678 kubelet[1432]: E1213 03:57:37.500601 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:38.502071 kubelet[1432]: E1213 03:57:38.502023 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:39.502636 kubelet[1432]: E1213 03:57:39.502574 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:40.043476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4027007058.mount: Deactivated successfully. Dec 13 03:57:40.503645 kubelet[1432]: E1213 03:57:40.503565 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:41.504755 kubelet[1432]: E1213 03:57:41.504664 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:42.505612 kubelet[1432]: E1213 03:57:42.505519 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:43.506213 kubelet[1432]: E1213 03:57:43.506121 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:43.860554 env[1148]: time="2024-12-13T03:57:43.860397247Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:43.868915 env[1148]: time="2024-12-13T03:57:43.868852393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:43.875835 env[1148]: time="2024-12-13T03:57:43.875777705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:43.880271 env[1148]: time="2024-12-13T03:57:43.880210995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:57:43.882755 env[1148]: time="2024-12-13T03:57:43.882655235Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 03:57:43.889196 env[1148]: time="2024-12-13T03:57:43.889140566Z" level=info msg="CreateContainer within sandbox \"207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 03:57:43.904269 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount811713635.mount: Deactivated successfully. Dec 13 03:57:43.916780 env[1148]: time="2024-12-13T03:57:43.916732315Z" level=info msg="CreateContainer within sandbox \"207b61c8264669be2978339e928bfdbb75c0d61f7b43779fc34aa221a9215e07\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bfc39ace75c1a17bc22f6dd2a5eb821a9d437df60f285b76c25549ae8b5a119e\"" Dec 13 03:57:43.919053 env[1148]: time="2024-12-13T03:57:43.918985675Z" level=info msg="StartContainer for \"bfc39ace75c1a17bc22f6dd2a5eb821a9d437df60f285b76c25549ae8b5a119e\"" Dec 13 03:57:43.968117 systemd[1]: Started cri-containerd-bfc39ace75c1a17bc22f6dd2a5eb821a9d437df60f285b76c25549ae8b5a119e.scope. Dec 13 03:57:43.992204 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 03:57:43.992317 kernel: audit: type=1400 audit(1734062263.986:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.995363 kernel: audit: type=1400 audit(1734062263.986:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.999764 kernel: audit: type=1400 audit(1734062263.986:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.001137 kernel: audit: type=1400 audit(1734062263.986:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.007589 kernel: audit: type=1400 audit(1734062263.986:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.011017 kernel: audit: type=1400 audit(1734062263.986:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.014487 kernel: audit: type=1400 audit(1734062263.986:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.015717 kernel: audit: type=1400 audit(1734062263.986:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.022361 kernel: audit: type=1400 audit(1734062263.986:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:44.028393 kernel: audit: type=1400 audit(1734062263.990:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.990000 audit: BPF prog-id=137 op=LOAD Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3146 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:43.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633339616365373563316131376263323266366464326135656238 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3146 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:43.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633339616365373563316131376263323266366464326135656238 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.991000 audit: BPF prog-id=138 op=LOAD Dec 13 03:57:43.991000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000309010 items=0 ppid=3146 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:43.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633339616365373563316131376263323266366464326135656238 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit: BPF prog-id=139 op=LOAD Dec 13 03:57:43.997000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000309058 items=0 ppid=3146 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:43.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633339616365373563316131376263323266366464326135656238 Dec 13 03:57:43.997000 audit: BPF prog-id=139 op=UNLOAD Dec 13 03:57:43.997000 audit: BPF prog-id=138 op=UNLOAD Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:57:43.997000 audit: BPF prog-id=140 op=LOAD Dec 13 03:57:43.997000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000309468 items=0 ppid=3146 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:43.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633339616365373563316131376263323266366464326135656238 Dec 13 03:57:44.044517 env[1148]: time="2024-12-13T03:57:44.044449249Z" level=info msg="StartContainer for \"bfc39ace75c1a17bc22f6dd2a5eb821a9d437df60f285b76c25549ae8b5a119e\" returns successfully" Dec 13 03:57:44.091000 audit[3220]: AVC avc: denied { search } for pid=3220 comm="rpcbind" name="crypto" dev="proc" ino=24683 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 03:57:44.091000 audit[3220]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb33d2f10c0 a2=0 a3=0 items=0 ppid=3203 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 key=(null) Dec 13 03:57:44.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 03:57:44.147000 audit[3225]: AVC avc: denied { search } for pid=3225 comm="dbus-daemon" name="crypto" dev="proc" ino=24683 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 03:57:44.147000 audit[3225]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f26176720c0 a2=0 a3=0 items=0 ppid=3203 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 key=(null) Dec 13 03:57:44.147000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 03:57:44.153000 audit[3226]: AVC avc: denied { watch } for pid=3226 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c340,c927 tclass=dir permissive=0 Dec 13 03:57:44.153000 audit[3226]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55dc3cc25940 a2=2c8 a3=7fff8b60c4ec items=0 ppid=3203 pid=3226 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 key=(null) Dec 13 03:57:44.153000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 03:57:44.164000 audit[3227]: AVC avc: denied { read } for pid=3227 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24707 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 03:57:44.164000 audit[3227]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f01d3e16320 a1=80000 a2=d a3=7ffc4cbb69a0 items=0 ppid=3203 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 key=(null) Dec 13 03:57:44.164000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 03:57:44.166000 audit[3227]: AVC avc: denied { search } for pid=3227 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24683 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 03:57:44.166000 audit[3227]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f01d336a0c0 a2=0 a3=0 items=0 ppid=3203 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c927 key=(null) Dec 13 03:57:44.166000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 03:57:44.310000 audit[3232]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:44.310000 audit[3232]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc921f23c0 a2=0 a3=7ffc921f23ac items=0 ppid=1584 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:44.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:44.318000 audit[3232]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:57:44.318000 audit[3232]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc921f23c0 a2=0 a3=7ffc921f23ac items=0 ppid=1584 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:57:44.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:57:44.506280 kubelet[1432]: E1213 03:57:44.506240 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:44.903586 systemd[1]: run-containerd-runc-k8s.io-bfc39ace75c1a17bc22f6dd2a5eb821a9d437df60f285b76c25549ae8b5a119e-runc.RjHV2i.mount: Deactivated successfully. Dec 13 03:57:45.254101 kubelet[1432]: I1213 03:57:45.253913 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.85448484 podStartE2EDuration="11.253841075s" podCreationTimestamp="2024-12-13 03:57:34 +0000 UTC" firstStartedPulling="2024-12-13 03:57:35.485755093 +0000 UTC m=+71.476337568" lastFinishedPulling="2024-12-13 03:57:43.885111278 +0000 UTC m=+79.875693803" observedRunningTime="2024-12-13 03:57:44.247043719 +0000 UTC m=+80.237626234" watchObservedRunningTime="2024-12-13 03:57:45.253841075 +0000 UTC m=+81.244423600" Dec 13 03:57:45.429649 kubelet[1432]: E1213 03:57:45.429591 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:45.507264 kubelet[1432]: E1213 03:57:45.506940 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:46.508070 kubelet[1432]: E1213 03:57:46.507891 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:47.509168 kubelet[1432]: E1213 03:57:47.509090 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:48.510261 kubelet[1432]: E1213 03:57:48.510184 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:49.512032 kubelet[1432]: E1213 03:57:49.511939 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:50.512925 kubelet[1432]: E1213 03:57:50.512865 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:51.513934 kubelet[1432]: E1213 03:57:51.513815 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:52.514806 kubelet[1432]: E1213 03:57:52.514748 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:53.515720 kubelet[1432]: E1213 03:57:53.515615 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:54.516078 kubelet[1432]: E1213 03:57:54.515898 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:55.516785 kubelet[1432]: E1213 03:57:55.516688 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:56.517479 kubelet[1432]: E1213 03:57:56.517397 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:57.518481 kubelet[1432]: E1213 03:57:57.518387 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:58.518682 kubelet[1432]: E1213 03:57:58.518631 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:57:59.520562 kubelet[1432]: E1213 03:57:59.520497 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:00.522409 kubelet[1432]: E1213 03:58:00.522288 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:01.523734 kubelet[1432]: E1213 03:58:01.523583 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:02.524945 kubelet[1432]: E1213 03:58:02.524876 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:03.526247 kubelet[1432]: E1213 03:58:03.526184 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:04.527657 kubelet[1432]: E1213 03:58:04.527581 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:05.430028 kubelet[1432]: E1213 03:58:05.429922 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:05.529245 kubelet[1432]: E1213 03:58:05.529166 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:06.529484 kubelet[1432]: E1213 03:58:06.529382 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:07.529863 kubelet[1432]: E1213 03:58:07.529793 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:08.530779 kubelet[1432]: E1213 03:58:08.530734 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:08.605832 kubelet[1432]: I1213 03:58:08.605760 1432 topology_manager.go:215] "Topology Admit Handler" podUID="5518bccc-8416-4c70-aa18-b6bcc0cf44a6" podNamespace="default" podName="test-pod-1" Dec 13 03:58:08.617074 systemd[1]: Created slice kubepods-besteffort-pod5518bccc_8416_4c70_aa18_b6bcc0cf44a6.slice. Dec 13 03:58:08.720949 kubelet[1432]: I1213 03:58:08.720887 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d72de8a2-acfb-4981-aef3-32bcc8f0d7dc\" (UniqueName: \"kubernetes.io/nfs/5518bccc-8416-4c70-aa18-b6bcc0cf44a6-pvc-d72de8a2-acfb-4981-aef3-32bcc8f0d7dc\") pod \"test-pod-1\" (UID: \"5518bccc-8416-4c70-aa18-b6bcc0cf44a6\") " pod="default/test-pod-1" Dec 13 03:58:08.721306 kubelet[1432]: I1213 03:58:08.721269 1432 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6j6tp\" (UniqueName: \"kubernetes.io/projected/5518bccc-8416-4c70-aa18-b6bcc0cf44a6-kube-api-access-6j6tp\") pod \"test-pod-1\" (UID: \"5518bccc-8416-4c70-aa18-b6bcc0cf44a6\") " pod="default/test-pod-1" Dec 13 03:58:08.901000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.930704 kernel: Failed to create system directory netfs Dec 13 03:58:08.930908 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 03:58:08.930969 kernel: audit: type=1400 audit(1734062288.901:843): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.931033 kernel: Failed to create system directory netfs Dec 13 03:58:08.931085 kernel: audit: type=1400 audit(1734062288.901:843): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.901000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.941824 kernel: Failed to create system directory netfs Dec 13 03:58:08.941970 kernel: audit: type=1400 audit(1734062288.901:843): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.901000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.952924 kernel: Failed to create system directory netfs Dec 13 03:58:08.953056 kernel: audit: type=1400 audit(1734062288.901:843): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.901000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.901000 audit[3287]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d732f345e0 a1=153bc a2=55d731e6b2b0 a3=5 items=0 ppid=1004 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:08.976310 kernel: audit: type=1300 audit(1734062288.901:843): arch=c000003e syscall=175 success=yes exit=0 a0=55d732f345e0 a1=153bc a2=55d731e6b2b0 a3=5 items=0 ppid=1004 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:08.976421 kernel: audit: type=1327 audit(1734062288.901:843): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:58:08.901000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:58:09.004091 kernel: Failed to create system directory fscache Dec 13 03:58:09.004231 kernel: audit: type=1400 audit(1734062288.985:844): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.004280 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.012173 kernel: audit: type=1400 audit(1734062288.985:844): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.012263 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.020555 kernel: audit: type=1400 audit(1734062288.985:844): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.020630 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.028961 kernel: audit: type=1400 audit(1734062288.985:844): avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.029032 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.031284 kernel: Failed to create system directory fscache Dec 13 03:58:09.031401 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.033611 kernel: Failed to create system directory fscache Dec 13 03:58:09.033696 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.035890 kernel: Failed to create system directory fscache Dec 13 03:58:09.035984 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.038179 kernel: Failed to create system directory fscache Dec 13 03:58:09.038252 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.039517 kernel: Failed to create system directory fscache Dec 13 03:58:08.985000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:08.985000 audit[3287]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d7331499c0 a1=4c0fc a2=55d731e6b2b0 a3=5 items=0 ppid=1004 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.048746 kernel: FS-Cache: Loaded Dec 13 03:58:08.985000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.098032 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.098090 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.099288 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.101797 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.101846 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.102996 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.104233 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.105521 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.106736 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.108007 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.109283 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.111633 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.111670 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.112904 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.114187 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.115443 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.116749 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.117994 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.119261 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.121733 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.121779 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.122937 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.124181 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.125456 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.125546 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.127643 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.127711 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.129873 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.130523 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.131053 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.133499 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.133551 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.134508 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.135647 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.136789 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.137891 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.139009 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.141332 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.141445 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.143727 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.143857 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.148082 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.148204 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.151485 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.151591 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.152759 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.154682 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.154762 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.155644 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.156593 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.157542 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.158482 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.159428 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.161280 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.161420 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.162275 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.163184 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.164147 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.165102 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.166046 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.167012 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.167956 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.168905 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.169861 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.170810 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.172723 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.172812 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.174657 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.174731 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.175616 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.176564 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.177506 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.178467 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.179434 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.180409 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.187989 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188077 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188136 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188186 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188229 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188275 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188318 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.188390 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.189944 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.190016 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.191693 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.191818 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.192817 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.193745 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.194785 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.195747 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.196720 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.197708 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.198631 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.199647 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.200657 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.201585 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.202505 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.203482 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.205342 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.205483 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.207497 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.207656 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.209264 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.209464 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.210201 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.211154 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.212162 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.213058 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.214014 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.215026 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.215988 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.216925 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.218092 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.220195 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.220278 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.221299 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.222465 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.225868 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.225979 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.228030 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.228152 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.229128 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.234650 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.236803 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.236901 kernel: Failed to create system directory sunrpc Dec 13 03:58:09.077000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.249738 kernel: RPC: Registered named UNIX socket transport module. Dec 13 03:58:09.249878 kernel: RPC: Registered udp transport module. Dec 13 03:58:09.249917 kernel: RPC: Registered tcp transport module. Dec 13 03:58:09.250701 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 03:58:09.077000 audit[3287]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d733195ad0 a1=1a7f1c a2=55d731e6b2b0 a3=5 items=6 ppid=1004 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.077000 audit: CWD cwd="/" Dec 13 03:58:09.077000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:58:09.077000 audit: PATH item=1 name=(null) inode=24123 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:58:09.077000 audit: PATH item=2 name=(null) inode=24123 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:58:09.077000 audit: PATH item=3 name=(null) inode=24124 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:58:09.077000 audit: PATH item=4 name=(null) inode=24123 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:58:09.077000 audit: PATH item=5 name=(null) inode=24125 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:58:09.077000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.340689 kernel: Failed to create system directory nfs Dec 13 03:58:09.340830 kernel: Failed to create system directory nfs Dec 13 03:58:09.340910 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.341513 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.343435 kernel: Failed to create system directory nfs Dec 13 03:58:09.343565 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.344283 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.345160 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.346029 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.346943 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.347926 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.348847 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.349768 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.350666 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.351596 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.352508 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.354332 kernel: Failed to create system directory nfs Dec 13 03:58:09.354473 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.355249 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.356186 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.357089 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.358015 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.358936 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.359863 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.360768 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.362786 kernel: Failed to create system directory nfs Dec 13 03:58:09.362928 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.363735 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.364652 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.365573 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.366496 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.368511 kernel: Failed to create system directory nfs Dec 13 03:58:09.368651 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.370732 kernel: Failed to create system directory nfs Dec 13 03:58:09.370858 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.372985 kernel: Failed to create system directory nfs Dec 13 03:58:09.373126 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.374979 kernel: Failed to create system directory nfs Dec 13 03:58:09.375089 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.377111 kernel: Failed to create system directory nfs Dec 13 03:58:09.377251 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.379330 kernel: Failed to create system directory nfs Dec 13 03:58:09.379511 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.380407 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.382591 kernel: Failed to create system directory nfs Dec 13 03:58:09.382718 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.384727 kernel: Failed to create system directory nfs Dec 13 03:58:09.384854 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.386791 kernel: Failed to create system directory nfs Dec 13 03:58:09.386918 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.388996 kernel: Failed to create system directory nfs Dec 13 03:58:09.389131 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.390054 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.391099 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.393220 kernel: Failed to create system directory nfs Dec 13 03:58:09.393385 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.394199 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.395283 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.396300 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.397503 kernel: Failed to create system directory nfs Dec 13 03:58:09.322000 audit[3287]: AVC avc: denied { confidentiality } for pid=3287 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.426619 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 03:58:09.322000 audit[3287]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d7333b6700 a1=16e97c a2=55d731e6b2b0 a3=5 items=0 ppid=1004 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.322000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.486118 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.486452 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.488104 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.488246 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.489268 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.490434 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.492772 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.492910 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.493788 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.494980 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.496131 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.497260 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.498455 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.499482 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.500507 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.501679 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.502705 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.503871 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.504982 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.506051 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.507122 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.508205 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.509196 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.510513 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.512813 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.512974 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.515187 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.515521 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.516313 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.518766 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.518940 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.519881 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.520989 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.522197 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.523248 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.524433 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.525568 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.526642 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.527752 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.528833 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.529954 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.531094 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.532912 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.533834 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.534020 kubelet[1432]: E1213 03:58:09.532343 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:09.535047 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.536754 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.536896 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.537737 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.538781 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.539892 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.541018 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.543436 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.543574 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.544500 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.545591 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.546731 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.547840 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.548978 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.550033 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.551089 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.553553 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.553707 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.554552 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.555669 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.556809 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.557812 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.558954 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.560104 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.561245 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.563533 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.563673 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.564641 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.566948 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.567087 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.568102 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.569222 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.570240 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.571490 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.572627 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.573600 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.574642 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.575771 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.576893 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.577970 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.579012 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.580139 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.581258 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.582294 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.583422 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.584445 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.585504 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.587622 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.587758 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.588746 kernel: Failed to create system directory nfs4 Dec 13 03:58:09.461000 audit[3292]: AVC avc: denied { confidentiality } for pid=3292 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.757775 kernel: NFS: Registering the id_resolver key type Dec 13 03:58:09.758019 kernel: Key type id_resolver registered Dec 13 03:58:09.758074 kernel: Key type id_legacy registered Dec 13 03:58:09.461000 audit[3292]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fae14b7b010 a1=208de4 a2=556f9701b2b0 a3=5 items=0 ppid=1004 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.461000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.799265 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.799420 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.799516 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.801048 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.801144 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.803126 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.803252 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.805293 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.805390 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.807226 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.807373 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.809298 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.809444 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.811450 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.811558 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.817126 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.817258 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.818168 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.820237 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.820416 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.821419 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.822511 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.825014 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.825189 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.827034 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.827143 kernel: Failed to create system directory rpcgss Dec 13 03:58:09.789000 audit[3294]: AVC avc: denied { confidentiality } for pid=3294 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:58:09.789000 audit[3294]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe45596d010 a1=70af4 a2=55b86b82b2b0 a3=5 items=0 ppid=1004 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.789000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 03:58:09.882439 nfsidmap[3299]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 03:58:09.890566 nfsidmap[3300]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 03:58:09.905000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:58:09.905000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:58:09.905000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:58:09.909000 audit[1220]: AVC avc: denied { watch_reads } for pid=1220 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:58:09.909000 audit[1220]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f32ddcf090 a2=10 a3=2af3bba7701e326a items=0 ppid=1 pid=1220 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.909000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:58:09.909000 audit[1220]: AVC avc: denied { watch_reads } for pid=1220 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:58:09.909000 audit[1220]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f32ddcf090 a2=10 a3=2af3bba7701e326a items=0 ppid=1 pid=1220 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.909000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:58:09.909000 audit[1220]: AVC avc: denied { watch_reads } for pid=1220 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:58:09.909000 audit[1220]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f32ddcf090 a2=10 a3=2af3bba7701e326a items=0 ppid=1 pid=1220 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:09.909000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:58:10.125501 env[1148]: time="2024-12-13T03:58:10.125218604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5518bccc-8416-4c70-aa18-b6bcc0cf44a6,Namespace:default,Attempt:0,}" Dec 13 03:58:10.533759 kubelet[1432]: E1213 03:58:10.533664 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:10.977031 systemd-networkd[973]: cali5ec59c6bf6e: Link UP Dec 13 03:58:10.987477 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:58:10.987774 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 03:58:10.989631 systemd-networkd[973]: cali5ec59c6bf6e: Gained carrier Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.402 [INFO][3301] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.138-k8s-test--pod--1-eth0 default 5518bccc-8416-4c70-aa18-b6bcc0cf44a6 1529 0 2024-12-13 03:57:37 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.138 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.403 [INFO][3301] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.693 [INFO][3313] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" HandleID="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Workload="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.746 [INFO][3313] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" HandleID="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Workload="172.24.4.138-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030c5f0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.138", "pod":"test-pod-1", "timestamp":"2024-12-13 03:58:10.693526345 +0000 UTC"}, Hostname:"172.24.4.138", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.746 [INFO][3313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.746 [INFO][3313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.746 [INFO][3313] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.138' Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.750 [INFO][3313] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.770 [INFO][3313] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.778 [INFO][3313] ipam/ipam.go 489: Trying affinity for 192.168.111.128/26 host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.783 [INFO][3313] ipam/ipam.go 155: Attempting to load block cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.789 [INFO][3313] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.111.128/26 host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.789 [INFO][3313] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.111.128/26 handle="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.792 [INFO][3313] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.924 [INFO][3313] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.111.128/26 handle="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.957 [INFO][3313] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.111.132/26] block=192.168.111.128/26 handle="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.957 [INFO][3313] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.111.132/26] handle="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" host="172.24.4.138" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.957 [INFO][3313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.957 [INFO][3313] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.111.132/26] IPv6=[] ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" HandleID="k8s-pod-network.24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Workload="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.024414 env[1148]: 2024-12-13 03:58:10.962 [INFO][3301] cni-plugin/k8s.go 386: Populated endpoint ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5518bccc-8416-4c70-aa18-b6bcc0cf44a6", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 57, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.111.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:58:11.026237 env[1148]: 2024-12-13 03:58:10.962 [INFO][3301] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.111.132/32] ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.026237 env[1148]: 2024-12-13 03:58:10.962 [INFO][3301] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.026237 env[1148]: 2024-12-13 03:58:10.991 [INFO][3301] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.026237 env[1148]: 2024-12-13 03:58:10.992 [INFO][3301] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.138-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5518bccc-8416-4c70-aa18-b6bcc0cf44a6", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 57, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.138", ContainerID:"24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.111.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"06:19:7c:47:6e:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:58:11.026237 env[1148]: 2024-12-13 03:58:11.016 [INFO][3301] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.138-k8s-test--pod--1-eth0" Dec 13 03:58:11.052000 audit[3342]: NETFILTER_CFG table=filter:86 family=2 entries=44 op=nft_register_chain pid=3342 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:58:11.052000 audit[3342]: SYSCALL arch=c000003e syscall=46 success=yes exit=22252 a0=3 a1=7fffa33c19c0 a2=0 a3=7fffa33c19ac items=0 ppid=2427 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.052000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:58:11.055542 env[1148]: time="2024-12-13T03:58:11.055413188Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:58:11.055673 env[1148]: time="2024-12-13T03:58:11.055591494Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:58:11.055771 env[1148]: time="2024-12-13T03:58:11.055711640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:58:11.056178 env[1148]: time="2024-12-13T03:58:11.056100902Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d pid=3341 runtime=io.containerd.runc.v2 Dec 13 03:58:11.087850 systemd[1]: Started cri-containerd-24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d.scope. Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.103000 audit: BPF prog-id=141 op=LOAD Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3341 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633336353331653330316432643233313961396637396131616630 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3341 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633336353331653330316432643233313961396637396131616630 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit: BPF prog-id=142 op=LOAD Dec 13 03:58:11.104000 audit[3351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dfd50 items=0 ppid=3341 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633336353331653330316432643233313961396637396131616630 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit: BPF prog-id=143 op=LOAD Dec 13 03:58:11.104000 audit[3351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dfd98 items=0 ppid=3341 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633336353331653330316432643233313961396637396131616630 Dec 13 03:58:11.104000 audit: BPF prog-id=143 op=UNLOAD Dec 13 03:58:11.104000 audit: BPF prog-id=142 op=UNLOAD Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { perfmon } for pid=3351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit[3351]: AVC avc: denied { bpf } for pid=3351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.104000 audit: BPF prog-id=144 op=LOAD Dec 13 03:58:11.104000 audit[3351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c61a8 items=0 ppid=3341 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633336353331653330316432643233313961396637396131616630 Dec 13 03:58:11.140549 env[1148]: time="2024-12-13T03:58:11.140489054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5518bccc-8416-4c70-aa18-b6bcc0cf44a6,Namespace:default,Attempt:0,} returns sandbox id \"24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d\"" Dec 13 03:58:11.143551 env[1148]: time="2024-12-13T03:58:11.143510968Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 03:58:11.534728 kubelet[1432]: E1213 03:58:11.534622 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:11.540331 env[1148]: time="2024-12-13T03:58:11.540236822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:58:11.545542 env[1148]: time="2024-12-13T03:58:11.545464414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:58:11.551459 env[1148]: time="2024-12-13T03:58:11.551390751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:58:11.556313 env[1148]: time="2024-12-13T03:58:11.556233480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:58:11.558446 env[1148]: time="2024-12-13T03:58:11.558194328Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 03:58:11.565729 env[1148]: time="2024-12-13T03:58:11.565637307Z" level=info msg="CreateContainer within sandbox \"24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 03:58:11.600229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount889933069.mount: Deactivated successfully. Dec 13 03:58:11.615535 env[1148]: time="2024-12-13T03:58:11.615412107Z" level=info msg="CreateContainer within sandbox \"24c36531e301d2d2319a9f79a1af0bc34ca1707a81434c06c6094762409d133d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"f637246ad265bdc4032aa39d2653bb370426ed514f28c0515489f75252cd9a6a\"" Dec 13 03:58:11.617208 env[1148]: time="2024-12-13T03:58:11.617071117Z" level=info msg="StartContainer for \"f637246ad265bdc4032aa39d2653bb370426ed514f28c0515489f75252cd9a6a\"" Dec 13 03:58:11.669526 systemd[1]: Started cri-containerd-f637246ad265bdc4032aa39d2653bb370426ed514f28c0515489f75252cd9a6a.scope. Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.691000 audit: BPF prog-id=145 op=LOAD Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3341 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636333732343661643236356264633430333261613339643236353362 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3341 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636333732343661643236356264633430333261613339643236353362 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit: BPF prog-id=146 op=LOAD Dec 13 03:58:11.692000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000351ed0 items=0 ppid=3341 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636333732343661643236356264633430333261613339643236353362 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.692000 audit: BPF prog-id=147 op=LOAD Dec 13 03:58:11.692000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000351f18 items=0 ppid=3341 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636333732343661643236356264633430333261613339643236353362 Dec 13 03:58:11.693000 audit: BPF prog-id=147 op=UNLOAD Dec 13 03:58:11.693000 audit: BPF prog-id=146 op=UNLOAD Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:58:11.693000 audit: BPF prog-id=148 op=LOAD Dec 13 03:58:11.693000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b8328 items=0 ppid=3341 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:58:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636333732343661643236356264633430333261613339643236353362 Dec 13 03:58:11.720075 env[1148]: time="2024-12-13T03:58:11.720002806Z" level=info msg="StartContainer for \"f637246ad265bdc4032aa39d2653bb370426ed514f28c0515489f75252cd9a6a\" returns successfully" Dec 13 03:58:12.535861 kubelet[1432]: E1213 03:58:12.535784 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:12.595056 kubelet[1432]: I1213 03:58:12.594835 1432 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.175382403 podStartE2EDuration="35.594751356s" podCreationTimestamp="2024-12-13 03:57:37 +0000 UTC" firstStartedPulling="2024-12-13 03:58:11.142817123 +0000 UTC m=+107.133399608" lastFinishedPulling="2024-12-13 03:58:11.562186046 +0000 UTC m=+107.552768561" observedRunningTime="2024-12-13 03:58:12.593207031 +0000 UTC m=+108.583789566" watchObservedRunningTime="2024-12-13 03:58:12.594751356 +0000 UTC m=+108.585333882" Dec 13 03:58:13.011748 systemd-networkd[973]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 03:58:13.537567 kubelet[1432]: E1213 03:58:13.537504 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:14.539659 kubelet[1432]: E1213 03:58:14.539458 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:15.106055 systemd[1]: run-containerd-runc-k8s.io-be215a622b3ff3208d46c5ab67d779d26d99a06f61d1bae81074c0f8e71d519b-runc.Etu0fk.mount: Deactivated successfully. Dec 13 03:58:15.540685 kubelet[1432]: E1213 03:58:15.540605 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:16.541974 kubelet[1432]: E1213 03:58:16.541917 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:17.543240 kubelet[1432]: E1213 03:58:17.543124 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:18.544461 kubelet[1432]: E1213 03:58:18.544336 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:19.545760 kubelet[1432]: E1213 03:58:19.545489 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:20.546757 kubelet[1432]: E1213 03:58:20.546469 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:21.547307 kubelet[1432]: E1213 03:58:21.547203 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:22.547901 kubelet[1432]: E1213 03:58:22.547767 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:23.548303 kubelet[1432]: E1213 03:58:23.548234 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:24.550253 kubelet[1432]: E1213 03:58:24.550133 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:25.429914 kubelet[1432]: E1213 03:58:25.429787 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:25.551195 kubelet[1432]: E1213 03:58:25.551127 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:58:26.552476 kubelet[1432]: E1213 03:58:26.552332 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"