Dec 13 14:48:49.991832 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:48:49.991868 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:48:49.991889 kernel: BIOS-provided physical RAM map: Dec 13 14:48:49.991903 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:48:49.991915 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:48:49.991928 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:48:49.991942 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 14:48:49.991955 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 14:48:49.991970 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:48:49.991982 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:48:49.991995 kernel: NX (Execute Disable) protection: active Dec 13 14:48:49.992007 kernel: SMBIOS 2.8 present. Dec 13 14:48:49.992019 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 14:48:49.992031 kernel: Hypervisor detected: KVM Dec 13 14:48:49.992046 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:48:49.992062 kernel: kvm-clock: cpu 0, msr 6119a001, primary cpu clock Dec 13 14:48:49.992075 kernel: kvm-clock: using sched offset of 5090483328 cycles Dec 13 14:48:49.992090 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:48:49.992104 kernel: tsc: Detected 1996.249 MHz processor Dec 13 14:48:49.992118 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:48:49.992132 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:48:49.992145 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 14:48:49.992159 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:48:49.992175 kernel: ACPI: Early table checksum verification disabled Dec 13 14:48:49.992188 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 14:48:49.992202 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:48:49.992216 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:48:49.992229 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:48:49.992242 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 14:48:49.992255 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:48:49.992269 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:48:49.992282 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 14:48:49.992298 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 14:48:49.992311 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 14:48:49.992325 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 14:48:49.992338 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 14:48:49.992351 kernel: No NUMA configuration found Dec 13 14:48:49.992365 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 14:48:49.992378 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 14:48:49.992392 kernel: Zone ranges: Dec 13 14:48:49.992412 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:48:49.992426 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 14:48:49.992440 kernel: Normal empty Dec 13 14:48:49.992454 kernel: Movable zone start for each node Dec 13 14:48:49.992468 kernel: Early memory node ranges Dec 13 14:48:49.992482 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:48:49.992498 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 14:48:49.992512 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 14:48:49.992526 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:48:49.992540 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:48:49.992554 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 14:48:49.992567 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:48:49.992581 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:48:49.992595 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:48:49.992609 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:48:49.992651 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:48:49.992666 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:48:49.992680 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:48:49.992694 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:48:49.992708 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:48:49.992722 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:48:49.992736 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 14:48:49.992750 kernel: Booting paravirtualized kernel on KVM Dec 13 14:48:49.992765 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:48:49.992779 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:48:49.992796 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:48:49.992810 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:48:49.992824 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:48:49.992837 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 13 14:48:49.992851 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 14:48:49.992866 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 14:48:49.992879 kernel: Policy zone: DMA32 Dec 13 14:48:49.992917 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:48:49.992938 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:48:49.992953 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:48:49.992967 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:48:49.992981 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:48:49.992996 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123076K reserved, 0K cma-reserved) Dec 13 14:48:49.993010 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:48:49.993024 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:48:49.993038 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:48:49.993055 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:48:49.993070 kernel: rcu: RCU event tracing is enabled. Dec 13 14:48:49.993084 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:48:49.993099 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:48:49.993113 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:48:49.993127 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:48:49.993141 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:48:49.993155 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:48:49.993169 kernel: Console: colour VGA+ 80x25 Dec 13 14:48:49.993185 kernel: printk: console [tty0] enabled Dec 13 14:48:49.993199 kernel: printk: console [ttyS0] enabled Dec 13 14:48:49.993213 kernel: ACPI: Core revision 20210730 Dec 13 14:48:49.993228 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:48:49.993241 kernel: x2apic enabled Dec 13 14:48:49.993255 kernel: Switched APIC routing to physical x2apic. Dec 13 14:48:49.993269 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:48:49.993283 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:48:49.993298 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 14:48:49.993312 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 14:48:49.993328 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 14:48:49.993343 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:48:49.993357 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:48:49.993371 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:48:49.993385 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:48:49.993399 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:48:49.993413 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 14:48:49.993427 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:48:49.993441 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:48:49.993457 kernel: LSM: Security Framework initializing Dec 13 14:48:49.993471 kernel: SELinux: Initializing. Dec 13 14:48:49.993485 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:48:49.993500 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:48:49.993514 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 14:48:49.993528 kernel: Performance Events: AMD PMU driver. Dec 13 14:48:49.993542 kernel: ... version: 0 Dec 13 14:48:49.993556 kernel: ... bit width: 48 Dec 13 14:48:49.993570 kernel: ... generic registers: 4 Dec 13 14:48:49.993594 kernel: ... value mask: 0000ffffffffffff Dec 13 14:48:49.993609 kernel: ... max period: 00007fffffffffff Dec 13 14:48:49.995654 kernel: ... fixed-purpose events: 0 Dec 13 14:48:49.995665 kernel: ... event mask: 000000000000000f Dec 13 14:48:49.995674 kernel: signal: max sigframe size: 1440 Dec 13 14:48:49.995684 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:48:49.995693 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:48:49.995703 kernel: x86: Booting SMP configuration: Dec 13 14:48:49.995713 kernel: .... node #0, CPUs: #1 Dec 13 14:48:49.995723 kernel: kvm-clock: cpu 1, msr 6119a041, secondary cpu clock Dec 13 14:48:49.995732 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 13 14:48:49.995741 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:48:49.995751 kernel: smpboot: Max logical packages: 2 Dec 13 14:48:49.995760 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 14:48:49.995769 kernel: devtmpfs: initialized Dec 13 14:48:49.995779 kernel: x86/mm: Memory block size: 128MB Dec 13 14:48:49.995788 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:48:49.995799 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:48:49.995809 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:48:49.995818 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:48:49.995827 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:48:49.995837 kernel: audit: type=2000 audit(1734101328.800:1): state=initialized audit_enabled=0 res=1 Dec 13 14:48:49.995846 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:48:49.995855 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:48:49.995864 kernel: cpuidle: using governor menu Dec 13 14:48:49.995874 kernel: ACPI: bus type PCI registered Dec 13 14:48:49.995884 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:48:49.995894 kernel: dca service started, version 1.12.1 Dec 13 14:48:49.995903 kernel: PCI: Using configuration type 1 for base access Dec 13 14:48:49.995912 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:48:49.995922 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:48:49.995932 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:48:49.995941 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:48:49.995950 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:48:49.995959 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:48:49.995970 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:48:49.995979 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:48:49.995989 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:48:49.995998 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:48:49.996007 kernel: ACPI: Interpreter enabled Dec 13 14:48:49.996016 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:48:49.996026 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:48:49.996035 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:48:49.996044 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 14:48:49.996056 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:48:49.996196 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:48:49.996286 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:48:49.996300 kernel: acpiphp: Slot [3] registered Dec 13 14:48:49.996308 kernel: acpiphp: Slot [4] registered Dec 13 14:48:49.996317 kernel: acpiphp: Slot [5] registered Dec 13 14:48:49.996325 kernel: acpiphp: Slot [6] registered Dec 13 14:48:49.996336 kernel: acpiphp: Slot [7] registered Dec 13 14:48:49.996344 kernel: acpiphp: Slot [8] registered Dec 13 14:48:49.996353 kernel: acpiphp: Slot [9] registered Dec 13 14:48:49.996361 kernel: acpiphp: Slot [10] registered Dec 13 14:48:49.996369 kernel: acpiphp: Slot [11] registered Dec 13 14:48:49.996378 kernel: acpiphp: Slot [12] registered Dec 13 14:48:49.996386 kernel: acpiphp: Slot [13] registered Dec 13 14:48:49.996394 kernel: acpiphp: Slot [14] registered Dec 13 14:48:49.996402 kernel: acpiphp: Slot [15] registered Dec 13 14:48:49.996411 kernel: acpiphp: Slot [16] registered Dec 13 14:48:49.996420 kernel: acpiphp: Slot [17] registered Dec 13 14:48:49.996429 kernel: acpiphp: Slot [18] registered Dec 13 14:48:49.996437 kernel: acpiphp: Slot [19] registered Dec 13 14:48:49.996445 kernel: acpiphp: Slot [20] registered Dec 13 14:48:49.996453 kernel: acpiphp: Slot [21] registered Dec 13 14:48:49.996461 kernel: acpiphp: Slot [22] registered Dec 13 14:48:49.996470 kernel: acpiphp: Slot [23] registered Dec 13 14:48:49.996478 kernel: acpiphp: Slot [24] registered Dec 13 14:48:49.996486 kernel: acpiphp: Slot [25] registered Dec 13 14:48:49.996496 kernel: acpiphp: Slot [26] registered Dec 13 14:48:49.996504 kernel: acpiphp: Slot [27] registered Dec 13 14:48:49.996512 kernel: acpiphp: Slot [28] registered Dec 13 14:48:49.996521 kernel: acpiphp: Slot [29] registered Dec 13 14:48:49.996529 kernel: acpiphp: Slot [30] registered Dec 13 14:48:49.996537 kernel: acpiphp: Slot [31] registered Dec 13 14:48:49.996545 kernel: PCI host bridge to bus 0000:00 Dec 13 14:48:49.996663 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:48:49.996746 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:48:49.996829 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:48:49.996932 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:48:49.997011 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 14:48:49.997088 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:48:49.997189 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:48:49.997285 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:48:49.997387 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 14:48:49.997476 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 14:48:49.997571 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:48:49.999702 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:48:49.999815 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:48:49.999910 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:48:50.000005 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:48:50.000100 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 14:48:50.000188 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 14:48:50.000284 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 14:48:50.000373 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 14:48:50.000464 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 14:48:50.000562 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 14:48:50.000706 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 14:48:50.000795 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:48:50.000906 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:48:50.000993 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 14:48:50.001080 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 14:48:50.001166 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 14:48:50.001253 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 14:48:50.001351 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:48:50.001440 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:48:50.001527 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 14:48:50.001632 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 14:48:50.001731 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 14:48:50.001823 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 14:48:50.001910 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 14:48:50.002005 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:48:50.002089 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 14:48:50.002171 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 14:48:50.002183 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:48:50.002192 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:48:50.002200 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:48:50.002208 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:48:50.002215 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:48:50.002226 kernel: iommu: Default domain type: Translated Dec 13 14:48:50.002234 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:48:50.002315 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 14:48:50.002396 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:48:50.002477 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 14:48:50.002488 kernel: vgaarb: loaded Dec 13 14:48:50.002496 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:48:50.002505 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:48:50.002513 kernel: PTP clock support registered Dec 13 14:48:50.002523 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:48:50.002531 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:48:50.002539 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:48:50.002547 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 14:48:50.002555 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:48:50.002562 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:48:50.002570 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:48:50.002578 kernel: pnp: PnP ACPI init Dec 13 14:48:50.002684 kernel: pnp 00:03: [dma 2] Dec 13 14:48:50.002700 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:48:50.002709 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:48:50.002717 kernel: NET: Registered PF_INET protocol family Dec 13 14:48:50.002725 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:48:50.002734 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:48:50.002742 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:48:50.002750 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:48:50.002758 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:48:50.002767 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:48:50.002775 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:48:50.002783 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:48:50.002791 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:48:50.002800 kernel: NET: Registered PF_XDP protocol family Dec 13 14:48:50.002873 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:48:50.002955 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:48:50.003028 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:48:50.003099 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:48:50.003174 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 14:48:50.003256 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 14:48:50.003338 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:48:50.003419 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:48:50.003431 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:48:50.003439 kernel: Initialise system trusted keyrings Dec 13 14:48:50.003448 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:48:50.003458 kernel: Key type asymmetric registered Dec 13 14:48:50.003466 kernel: Asymmetric key parser 'x509' registered Dec 13 14:48:50.003474 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:48:50.003482 kernel: io scheduler mq-deadline registered Dec 13 14:48:50.003489 kernel: io scheduler kyber registered Dec 13 14:48:50.003497 kernel: io scheduler bfq registered Dec 13 14:48:50.003505 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:48:50.003514 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 14:48:50.003522 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:48:50.003530 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:48:50.003540 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:48:50.003548 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:48:50.003556 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:48:50.003564 kernel: random: crng init done Dec 13 14:48:50.003572 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:48:50.003580 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:48:50.003588 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:48:50.008761 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:48:50.008789 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:48:50.008869 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:48:50.008958 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:48:49 UTC (1734101329) Dec 13 14:48:50.009039 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 14:48:50.009051 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:48:50.009060 kernel: Segment Routing with IPv6 Dec 13 14:48:50.009069 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:48:50.009078 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:48:50.009087 kernel: Key type dns_resolver registered Dec 13 14:48:50.009098 kernel: IPI shorthand broadcast: enabled Dec 13 14:48:50.009107 kernel: sched_clock: Marking stable (739006532, 118889014)->(880792717, -22897171) Dec 13 14:48:50.009116 kernel: registered taskstats version 1 Dec 13 14:48:50.009124 kernel: Loading compiled-in X.509 certificates Dec 13 14:48:50.009133 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:48:50.009142 kernel: Key type .fscrypt registered Dec 13 14:48:50.009150 kernel: Key type fscrypt-provisioning registered Dec 13 14:48:50.009159 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:48:50.009169 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:48:50.009178 kernel: ima: No architecture policies found Dec 13 14:48:50.009186 kernel: clk: Disabling unused clocks Dec 13 14:48:50.009195 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:48:50.009204 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:48:50.009212 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:48:50.009221 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:48:50.009230 kernel: Run /init as init process Dec 13 14:48:50.009240 kernel: with arguments: Dec 13 14:48:50.009255 kernel: /init Dec 13 14:48:50.009268 kernel: with environment: Dec 13 14:48:50.009277 kernel: HOME=/ Dec 13 14:48:50.009285 kernel: TERM=linux Dec 13 14:48:50.009294 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:48:50.009305 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:48:50.009317 systemd[1]: Detected virtualization kvm. Dec 13 14:48:50.009326 systemd[1]: Detected architecture x86-64. Dec 13 14:48:50.009337 systemd[1]: Running in initrd. Dec 13 14:48:50.009347 systemd[1]: No hostname configured, using default hostname. Dec 13 14:48:50.009356 systemd[1]: Hostname set to . Dec 13 14:48:50.009365 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:48:50.009375 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:48:50.009384 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:48:50.009393 systemd[1]: Reached target cryptsetup.target. Dec 13 14:48:50.009402 systemd[1]: Reached target paths.target. Dec 13 14:48:50.009413 systemd[1]: Reached target slices.target. Dec 13 14:48:50.009422 systemd[1]: Reached target swap.target. Dec 13 14:48:50.009431 systemd[1]: Reached target timers.target. Dec 13 14:48:50.009440 systemd[1]: Listening on iscsid.socket. Dec 13 14:48:50.009449 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:48:50.009458 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:48:50.009467 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:48:50.009478 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:48:50.009487 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:48:50.009496 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:48:50.009505 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:48:50.009514 systemd[1]: Reached target sockets.target. Dec 13 14:48:50.009531 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:48:50.009542 systemd[1]: Finished network-cleanup.service. Dec 13 14:48:50.009553 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:48:50.009562 systemd[1]: Starting systemd-journald.service... Dec 13 14:48:50.009572 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:48:50.009581 systemd[1]: Starting systemd-resolved.service... Dec 13 14:48:50.009591 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:48:50.009600 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:48:50.009609 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:48:50.009666 systemd-journald[185]: Journal started Dec 13 14:48:50.009724 systemd-journald[185]: Runtime Journal (/run/log/journal/8d485ec60d6d4d939bf3400562e02c71) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:48:49.968652 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:48:50.030142 kernel: audit: type=1130 audit(1734101330.024:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.030176 systemd[1]: Started systemd-journald.service. Dec 13 14:48:50.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.018668 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:48:50.018678 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:48:50.018713 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:48:50.021367 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:48:50.037962 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:48:50.037981 kernel: audit: type=1130 audit(1734101330.037:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.037920 systemd[1]: Started systemd-resolved.service. Dec 13 14:48:50.050909 kernel: audit: type=1130 audit(1734101330.041:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.050939 kernel: audit: type=1130 audit(1734101330.042:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.050952 kernel: Bridge firewalling registered Dec 13 14:48:50.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.042466 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:48:50.043046 systemd[1]: Reached target nss-lookup.target. Dec 13 14:48:50.052084 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:48:50.053367 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:48:50.054182 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:48:50.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.062804 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:48:50.069501 kernel: audit: type=1130 audit(1734101330.062:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.072580 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:48:50.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.073894 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:48:50.078563 kernel: audit: type=1130 audit(1734101330.072:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.086157 dracut-cmdline[203]: dracut-dracut-053 Dec 13 14:48:50.089119 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:48:50.092044 kernel: SCSI subsystem initialized Dec 13 14:48:50.106635 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:48:50.107641 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:48:50.109638 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:48:50.114464 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:48:50.115318 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:48:50.117212 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:48:50.125858 kernel: audit: type=1130 audit(1734101330.115:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.128210 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:48:50.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.132650 kernel: audit: type=1130 audit(1734101330.128:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.174667 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:48:50.195682 kernel: iscsi: registered transport (tcp) Dec 13 14:48:50.222088 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:48:50.222149 kernel: QLogic iSCSI HBA Driver Dec 13 14:48:50.269557 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:48:50.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.274655 kernel: audit: type=1130 audit(1734101330.270:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.272665 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:48:50.356693 kernel: raid6: sse2x4 gen() 10731 MB/s Dec 13 14:48:50.373675 kernel: raid6: sse2x4 xor() 7040 MB/s Dec 13 14:48:50.390842 kernel: raid6: sse2x2 gen() 14569 MB/s Dec 13 14:48:50.407708 kernel: raid6: sse2x2 xor() 8637 MB/s Dec 13 14:48:50.424858 kernel: raid6: sse2x1 gen() 11271 MB/s Dec 13 14:48:50.442643 kernel: raid6: sse2x1 xor() 6904 MB/s Dec 13 14:48:50.442700 kernel: raid6: using algorithm sse2x2 gen() 14569 MB/s Dec 13 14:48:50.442727 kernel: raid6: .... xor() 8637 MB/s, rmw enabled Dec 13 14:48:50.443355 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 14:48:50.457707 kernel: xor: measuring software checksum speed Dec 13 14:48:50.457765 kernel: prefetch64-sse : 16045 MB/sec Dec 13 14:48:50.459415 kernel: generic_sse : 16718 MB/sec Dec 13 14:48:50.459450 kernel: xor: using function: generic_sse (16718 MB/sec) Dec 13 14:48:50.571673 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:48:50.586799 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:48:50.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.588000 audit: BPF prog-id=7 op=LOAD Dec 13 14:48:50.588000 audit: BPF prog-id=8 op=LOAD Dec 13 14:48:50.589875 systemd[1]: Starting systemd-udevd.service... Dec 13 14:48:50.603118 systemd-udevd[386]: Using default interface naming scheme 'v252'. Dec 13 14:48:50.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.607724 systemd[1]: Started systemd-udevd.service. Dec 13 14:48:50.611422 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:48:50.634850 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 14:48:50.676741 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:48:50.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.680010 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:48:50.719217 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:48:50.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:50.781657 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 14:48:50.796534 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:48:50.796556 kernel: GPT:17805311 != 41943039 Dec 13 14:48:50.796573 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:48:50.796583 kernel: GPT:17805311 != 41943039 Dec 13 14:48:50.796593 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:48:50.796602 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:48:50.814234 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (445) Dec 13 14:48:50.822901 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:48:50.870431 kernel: libata version 3.00 loaded. Dec 13 14:48:50.870457 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 14:48:50.870602 kernel: scsi host0: ata_piix Dec 13 14:48:50.870730 kernel: scsi host1: ata_piix Dec 13 14:48:50.870827 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 14:48:50.870839 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 14:48:50.877969 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:48:50.881312 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:48:50.881909 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:48:50.886772 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:48:50.889204 systemd[1]: Starting disk-uuid.service... Dec 13 14:48:50.901441 disk-uuid[462]: Primary Header is updated. Dec 13 14:48:50.901441 disk-uuid[462]: Secondary Entries is updated. Dec 13 14:48:50.901441 disk-uuid[462]: Secondary Header is updated. Dec 13 14:48:50.909636 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:48:50.914636 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:48:51.931662 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:48:51.933419 disk-uuid[463]: The operation has completed successfully. Dec 13 14:48:51.994837 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:48:51.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:51.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:51.995038 systemd[1]: Finished disk-uuid.service. Dec 13 14:48:52.018464 systemd[1]: Starting verity-setup.service... Dec 13 14:48:52.042719 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 14:48:52.153750 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:48:52.156519 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:48:52.160295 systemd[1]: Finished verity-setup.service. Dec 13 14:48:52.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.311686 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:48:52.312368 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:48:52.314809 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:48:52.318102 systemd[1]: Starting ignition-setup.service... Dec 13 14:48:52.321770 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:48:52.343573 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:48:52.343634 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:48:52.343649 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:48:52.395547 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:48:52.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.411572 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:48:52.412000 audit: BPF prog-id=9 op=LOAD Dec 13 14:48:52.413328 systemd[1]: Starting systemd-networkd.service... Dec 13 14:48:52.435745 systemd-networkd[631]: lo: Link UP Dec 13 14:48:52.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.435755 systemd-networkd[631]: lo: Gained carrier Dec 13 14:48:52.436395 systemd-networkd[631]: Enumeration completed Dec 13 14:48:52.436797 systemd-networkd[631]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:48:52.437032 systemd[1]: Started systemd-networkd.service. Dec 13 14:48:52.438531 systemd[1]: Reached target network.target. Dec 13 14:48:52.438730 systemd-networkd[631]: eth0: Link UP Dec 13 14:48:52.438734 systemd-networkd[631]: eth0: Gained carrier Dec 13 14:48:52.441547 systemd[1]: Starting iscsiuio.service... Dec 13 14:48:52.453441 systemd[1]: Started iscsiuio.service. Dec 13 14:48:52.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.454902 systemd[1]: Starting iscsid.service... Dec 13 14:48:52.460716 systemd-networkd[631]: eth0: DHCPv4 address 172.24.4.107/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:48:52.463890 iscsid[636]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:48:52.463890 iscsid[636]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:48:52.463890 iscsid[636]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:48:52.463890 iscsid[636]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:48:52.463890 iscsid[636]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:48:52.463890 iscsid[636]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:48:52.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.467926 systemd[1]: Finished ignition-setup.service. Dec 13 14:48:52.468742 systemd[1]: Started iscsid.service. Dec 13 14:48:52.469943 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:48:52.470989 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:48:52.490148 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:48:52.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.490718 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:48:52.491128 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:48:52.493303 systemd[1]: Reached target remote-fs.target. Dec 13 14:48:52.495796 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:48:52.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.509080 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:48:52.846293 ignition[639]: Ignition 2.14.0 Dec 13 14:48:52.846319 ignition[639]: Stage: fetch-offline Dec 13 14:48:52.846461 ignition[639]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:52.846504 ignition[639]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:52.848940 ignition[639]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:52.849182 ignition[639]: parsed url from cmdline: "" Dec 13 14:48:52.851544 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:48:52.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:52.849191 ignition[639]: no config URL provided Dec 13 14:48:52.849204 ignition[639]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:48:52.855387 systemd[1]: Starting ignition-fetch.service... Dec 13 14:48:52.849224 ignition[639]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:48:52.849235 ignition[639]: failed to fetch config: resource requires networking Dec 13 14:48:52.849449 ignition[639]: Ignition finished successfully Dec 13 14:48:52.875572 ignition[656]: Ignition 2.14.0 Dec 13 14:48:52.875598 ignition[656]: Stage: fetch Dec 13 14:48:52.875874 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:52.875914 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:52.877996 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:52.878194 ignition[656]: parsed url from cmdline: "" Dec 13 14:48:52.878203 ignition[656]: no config URL provided Dec 13 14:48:52.878216 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:48:52.878235 ignition[656]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:48:52.884569 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 14:48:52.884691 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 14:48:52.885210 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 14:48:53.102800 ignition[656]: GET result: OK Dec 13 14:48:53.103013 ignition[656]: parsing config with SHA512: 13844a2cb800aad025f36348344260ecfa818d954995e73c051a1960b434011766592659293a5db21af8801004bf95dc01aa0ea329e2d7937489d143c7fd3f93 Dec 13 14:48:53.113407 unknown[656]: fetched base config from "system" Dec 13 14:48:53.113451 unknown[656]: fetched base config from "system" Dec 13 14:48:53.114398 ignition[656]: fetch: fetch complete Dec 13 14:48:53.113476 unknown[656]: fetched user config from "openstack" Dec 13 14:48:53.114411 ignition[656]: fetch: fetch passed Dec 13 14:48:53.117946 systemd[1]: Finished ignition-fetch.service. Dec 13 14:48:53.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.114498 ignition[656]: Ignition finished successfully Dec 13 14:48:53.121859 systemd[1]: Starting ignition-kargs.service... Dec 13 14:48:53.141700 ignition[662]: Ignition 2.14.0 Dec 13 14:48:53.141727 ignition[662]: Stage: kargs Dec 13 14:48:53.141954 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:53.141993 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:53.144182 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:53.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.148569 systemd[1]: Finished ignition-kargs.service. Dec 13 14:48:53.146275 ignition[662]: kargs: kargs passed Dec 13 14:48:53.161034 systemd[1]: Starting ignition-disks.service... Dec 13 14:48:53.146367 ignition[662]: Ignition finished successfully Dec 13 14:48:53.179432 ignition[668]: Ignition 2.14.0 Dec 13 14:48:53.179457 ignition[668]: Stage: disks Dec 13 14:48:53.179751 ignition[668]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:53.179793 ignition[668]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:53.182046 ignition[668]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:53.184048 ignition[668]: disks: disks passed Dec 13 14:48:53.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.185453 systemd[1]: Finished ignition-disks.service. Dec 13 14:48:53.184138 ignition[668]: Ignition finished successfully Dec 13 14:48:53.187509 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:48:53.189499 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:48:53.191694 systemd[1]: Reached target local-fs.target. Dec 13 14:48:53.193847 systemd[1]: Reached target sysinit.target. Dec 13 14:48:53.196016 systemd[1]: Reached target basic.target. Dec 13 14:48:53.199918 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:48:53.234130 systemd-fsck[676]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:48:53.255751 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:48:53.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.259164 systemd[1]: Mounting sysroot.mount... Dec 13 14:48:53.283489 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:48:53.282515 systemd[1]: Mounted sysroot.mount. Dec 13 14:48:53.284919 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:48:53.288605 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:48:53.292404 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:48:53.295132 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 14:48:53.296320 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:48:53.296381 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:48:53.299600 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:48:53.310052 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:48:53.315034 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:48:53.326946 initrd-setup-root[688]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:48:53.334686 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (683) Dec 13 14:48:53.346659 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:48:53.346722 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:48:53.346750 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:48:53.352175 initrd-setup-root[706]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:48:53.369373 initrd-setup-root[722]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:48:53.370163 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:48:53.375665 initrd-setup-root[730]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:48:53.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.453673 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:48:53.454851 systemd[1]: Starting ignition-mount.service... Dec 13 14:48:53.456919 systemd[1]: Starting sysroot-boot.service... Dec 13 14:48:53.464676 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:48:53.465772 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:48:53.477345 ignition[750]: INFO : Ignition 2.14.0 Dec 13 14:48:53.478112 ignition[750]: INFO : Stage: mount Dec 13 14:48:53.478744 ignition[750]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:53.479452 ignition[750]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:53.481724 ignition[750]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:53.483525 ignition[750]: INFO : mount: mount passed Dec 13 14:48:53.484114 ignition[750]: INFO : Ignition finished successfully Dec 13 14:48:53.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.489184 systemd[1]: Finished ignition-mount.service. Dec 13 14:48:53.504865 systemd[1]: Finished sysroot-boot.service. Dec 13 14:48:53.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.507651 coreos-metadata[682]: Dec 13 14:48:53.507 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:48:53.525034 coreos-metadata[682]: Dec 13 14:48:53.524 INFO Fetch successful Dec 13 14:48:53.525034 coreos-metadata[682]: Dec 13 14:48:53.524 INFO wrote hostname ci-3510-3-6-8-1e1565123f.novalocal to /sysroot/etc/hostname Dec 13 14:48:53.528225 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 14:48:53.528318 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 14:48:53.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:53.530205 systemd[1]: Starting ignition-files.service... Dec 13 14:48:53.536915 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:48:53.545639 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Dec 13 14:48:53.548991 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:48:53.549014 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:48:53.549025 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:48:53.556669 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:48:53.566899 ignition[778]: INFO : Ignition 2.14.0 Dec 13 14:48:53.566899 ignition[778]: INFO : Stage: files Dec 13 14:48:53.567956 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:53.567956 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:53.567956 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:53.570391 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:48:53.571113 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:48:53.571113 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:48:53.573795 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:48:53.574538 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:48:53.575228 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:48:53.575010 unknown[778]: wrote ssh authorized keys file for user: core Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:48:53.576665 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:48:53.639992 systemd-networkd[631]: eth0: Gained IPv6LL Dec 13 14:48:54.025049 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 14:48:55.624518 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:48:55.624518 ignition[778]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:48:55.624518 ignition[778]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:48:55.624518 ignition[778]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:48:55.661648 ignition[778]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:48:55.669872 ignition[778]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:48:55.671567 ignition[778]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:48:55.673161 ignition[778]: INFO : files: files passed Dec 13 14:48:55.674207 ignition[778]: INFO : Ignition finished successfully Dec 13 14:48:55.683560 systemd[1]: Finished ignition-files.service. Dec 13 14:48:55.697076 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:48:55.697118 kernel: audit: type=1130 audit(1734101335.686:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.691470 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:48:55.698478 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:48:55.700034 systemd[1]: Starting ignition-quench.service... Dec 13 14:48:55.717921 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:48:55.718146 systemd[1]: Finished ignition-quench.service. Dec 13 14:48:55.737509 kernel: audit: type=1130 audit(1734101335.719:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.737557 kernel: audit: type=1131 audit(1734101335.719:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.737770 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:48:55.748739 kernel: audit: type=1130 audit(1734101335.738:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.728041 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:48:55.738872 systemd[1]: Reached target ignition-complete.target. Dec 13 14:48:55.751369 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:48:55.781355 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:48:55.781581 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:48:55.801102 kernel: audit: type=1130 audit(1734101335.783:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.801149 kernel: audit: type=1131 audit(1734101335.783:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.784201 systemd[1]: Reached target initrd-fs.target. Dec 13 14:48:55.802151 systemd[1]: Reached target initrd.target. Dec 13 14:48:55.804407 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:48:55.806175 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:48:55.832912 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:48:55.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.835790 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:48:55.846487 kernel: audit: type=1130 audit(1734101335.833:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.861075 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:48:55.863745 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:48:55.865211 systemd[1]: Stopped target timers.target. Dec 13 14:48:55.867433 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:48:55.878933 kernel: audit: type=1131 audit(1734101335.869:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.867763 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:48:55.869957 systemd[1]: Stopped target initrd.target. Dec 13 14:48:55.880136 systemd[1]: Stopped target basic.target. Dec 13 14:48:55.882429 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:48:55.884563 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:48:55.886787 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:48:55.889096 systemd[1]: Stopped target remote-fs.target. Dec 13 14:48:55.891272 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:48:55.893571 systemd[1]: Stopped target sysinit.target. Dec 13 14:48:55.895760 systemd[1]: Stopped target local-fs.target. Dec 13 14:48:55.897969 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:48:55.900096 systemd[1]: Stopped target swap.target. Dec 13 14:48:55.913217 kernel: audit: type=1131 audit(1734101335.903:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.902094 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:48:55.902445 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:48:55.925798 kernel: audit: type=1131 audit(1734101335.916:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.904588 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:48:55.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.914472 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:48:55.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.914880 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:48:55.917150 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:48:55.917518 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:48:55.927313 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:48:55.927706 systemd[1]: Stopped ignition-files.service. Dec 13 14:48:55.931319 systemd[1]: Stopping ignition-mount.service... Dec 13 14:48:55.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.949349 ignition[816]: INFO : Ignition 2.14.0 Dec 13 14:48:55.949349 ignition[816]: INFO : Stage: umount Dec 13 14:48:55.949349 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:55.949349 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:48:55.949349 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:48:55.939306 systemd[1]: Stopping iscsiuio.service... Dec 13 14:48:55.956103 ignition[816]: INFO : umount: umount passed Dec 13 14:48:55.956103 ignition[816]: INFO : Ignition finished successfully Dec 13 14:48:55.940291 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:48:55.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.940780 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:48:55.944010 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:48:55.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.945091 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:48:55.945485 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:48:55.947074 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:48:55.947423 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:48:55.958294 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:48:55.958518 systemd[1]: Stopped iscsiuio.service. Dec 13 14:48:55.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.961371 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:48:55.961558 systemd[1]: Stopped ignition-mount.service. Dec 13 14:48:55.966483 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:48:55.966723 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:48:55.971994 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:48:55.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.972091 systemd[1]: Stopped ignition-disks.service. Dec 13 14:48:55.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.973679 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:48:55.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.973774 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:48:55.975256 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:48:55.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:55.975339 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:48:55.976809 systemd[1]: Stopped target network.target. Dec 13 14:48:55.978213 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:48:55.978306 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:48:55.979884 systemd[1]: Stopped target paths.target. Dec 13 14:48:55.981698 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:48:55.986714 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:48:55.988277 systemd[1]: Stopped target slices.target. Dec 13 14:48:55.989784 systemd[1]: Stopped target sockets.target. Dec 13 14:48:55.991339 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:48:55.991417 systemd[1]: Closed iscsid.socket. Dec 13 14:48:56.001866 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:48:56.001942 systemd[1]: Closed iscsiuio.socket. Dec 13 14:48:56.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.002989 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:48:56.003058 systemd[1]: Stopped ignition-setup.service. Dec 13 14:48:56.004046 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:48:56.005122 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:48:56.007653 systemd-networkd[631]: eth0: DHCPv6 lease lost Dec 13 14:48:56.007845 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:48:56.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.010000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:48:56.008472 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:48:56.008561 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:48:56.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.011673 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:48:56.011777 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:48:56.013930 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:48:56.013984 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:48:56.015000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:48:56.015125 systemd[1]: Stopping network-cleanup.service... Dec 13 14:48:56.017245 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:48:56.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.017295 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:48:56.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.018268 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:48:56.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.018305 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:48:56.019473 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:48:56.019509 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:48:56.020212 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:48:56.026844 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:48:56.029308 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:48:56.029417 systemd[1]: Stopped network-cleanup.service. Dec 13 14:48:56.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.031729 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:48:56.031854 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:48:56.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.033569 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:48:56.033759 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:48:56.035416 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:48:56.035443 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:48:56.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.036257 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:48:56.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.036300 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:48:56.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.037341 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:48:56.037378 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:48:56.038262 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:48:56.038300 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:48:56.039823 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:48:56.040560 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:48:56.040605 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:48:56.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.046161 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:48:56.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.046237 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:48:56.348989 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:48:56.349209 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:48:56.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.351812 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:48:56.353853 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:48:56.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:56.353953 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:48:56.357662 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:48:56.401403 systemd[1]: Switching root. Dec 13 14:48:56.436021 iscsid[636]: iscsid shutting down. Dec 13 14:48:56.437418 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 13 14:48:56.437508 systemd-journald[185]: Journal stopped Dec 13 14:49:01.419777 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:49:01.419821 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:49:01.419835 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:49:01.419847 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:49:01.419862 kernel: SELinux: policy capability open_perms=1 Dec 13 14:49:01.419877 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:49:01.419891 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:49:01.419902 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:49:01.419916 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:49:01.419927 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:49:01.419939 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:49:01.419955 systemd[1]: Successfully loaded SELinux policy in 89.420ms. Dec 13 14:49:01.419973 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.066ms. Dec 13 14:49:01.419987 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:49:01.420001 systemd[1]: Detected virtualization kvm. Dec 13 14:49:01.420013 systemd[1]: Detected architecture x86-64. Dec 13 14:49:01.420027 systemd[1]: Detected first boot. Dec 13 14:49:01.420040 systemd[1]: Hostname set to . Dec 13 14:49:01.420052 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:49:01.420066 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:49:01.420078 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:49:01.420091 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:01.420104 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:01.420120 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:01.420132 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:49:01.420143 kernel: audit: type=1334 audit(1734101341.194:88): prog-id=12 op=LOAD Dec 13 14:49:01.420154 kernel: audit: type=1334 audit(1734101341.194:89): prog-id=3 op=UNLOAD Dec 13 14:49:01.420166 kernel: audit: type=1334 audit(1734101341.195:90): prog-id=13 op=LOAD Dec 13 14:49:01.420177 kernel: audit: type=1334 audit(1734101341.197:91): prog-id=14 op=LOAD Dec 13 14:49:01.420188 kernel: audit: type=1334 audit(1734101341.197:92): prog-id=4 op=UNLOAD Dec 13 14:49:01.420202 kernel: audit: type=1334 audit(1734101341.197:93): prog-id=5 op=UNLOAD Dec 13 14:49:01.420214 kernel: audit: type=1334 audit(1734101341.198:94): prog-id=15 op=LOAD Dec 13 14:49:01.420225 kernel: audit: type=1334 audit(1734101341.198:95): prog-id=12 op=UNLOAD Dec 13 14:49:01.420237 kernel: audit: type=1334 audit(1734101341.199:96): prog-id=16 op=LOAD Dec 13 14:49:01.420250 kernel: audit: type=1334 audit(1734101341.200:97): prog-id=17 op=LOAD Dec 13 14:49:01.420262 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:49:01.420274 systemd[1]: Stopped iscsid.service. Dec 13 14:49:01.420287 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:49:01.420299 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:49:01.420313 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:49:01.420327 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:49:01.420339 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:49:01.420352 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:49:01.420364 systemd[1]: Created slice system-getty.slice. Dec 13 14:49:01.420377 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:49:01.420390 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:49:01.420405 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:49:01.420418 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:49:01.420430 systemd[1]: Created slice user.slice. Dec 13 14:49:01.420443 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:49:01.420457 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:49:01.420470 systemd[1]: Set up automount boot.automount. Dec 13 14:49:01.420482 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:49:01.420493 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:49:01.420504 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:49:01.420516 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:49:01.420527 systemd[1]: Reached target integritysetup.target. Dec 13 14:49:01.420539 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:49:01.420550 systemd[1]: Reached target remote-fs.target. Dec 13 14:49:01.420561 systemd[1]: Reached target slices.target. Dec 13 14:49:01.420574 systemd[1]: Reached target swap.target. Dec 13 14:49:01.420587 systemd[1]: Reached target torcx.target. Dec 13 14:49:01.420598 systemd[1]: Reached target veritysetup.target. Dec 13 14:49:01.420609 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:49:01.422225 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:49:01.422239 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:49:01.422250 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:49:01.422262 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:49:01.422273 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:49:01.422284 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:49:01.422298 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:49:01.422309 systemd[1]: Mounting media.mount... Dec 13 14:49:01.422321 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:01.422332 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:49:01.422343 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:49:01.422355 systemd[1]: Mounting tmp.mount... Dec 13 14:49:01.422365 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:49:01.422377 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:01.422389 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:49:01.422401 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:49:01.422412 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:01.422423 systemd[1]: Starting modprobe@drm.service... Dec 13 14:49:01.422434 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:01.422446 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:49:01.422457 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:01.422469 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:49:01.422480 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:49:01.422493 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:49:01.422505 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:49:01.422516 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:49:01.422528 systemd[1]: Stopped systemd-journald.service. Dec 13 14:49:01.422539 systemd[1]: Starting systemd-journald.service... Dec 13 14:49:01.422550 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:49:01.422561 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:49:01.422572 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:49:01.422583 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:49:01.422595 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:49:01.422608 systemd[1]: Stopped verity-setup.service. Dec 13 14:49:01.422643 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:01.422656 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:49:01.422667 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:49:01.422678 systemd[1]: Mounted media.mount. Dec 13 14:49:01.422689 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:49:01.422700 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:49:01.422711 systemd[1]: Mounted tmp.mount. Dec 13 14:49:01.422722 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:49:01.422736 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:49:01.422747 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:49:01.422759 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:01.422770 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:01.422783 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:49:01.422797 systemd-journald[933]: Journal started Dec 13 14:49:01.422839 systemd-journald[933]: Runtime Journal (/run/log/journal/8d485ec60d6d4d939bf3400562e02c71) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:48:56.732000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:48:56.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:48:56.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:48:56.862000 audit: BPF prog-id=10 op=LOAD Dec 13 14:48:56.862000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:48:56.862000 audit: BPF prog-id=11 op=LOAD Dec 13 14:48:56.862000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:48:57.043000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:48:57.043000 audit[848]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:01.427557 systemd[1]: Finished modprobe@drm.service. Dec 13 14:49:01.427593 kernel: loop: module loaded Dec 13 14:49:01.427608 systemd[1]: Started systemd-journald.service. Dec 13 14:48:57.043000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:48:57.048000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:48:57.048000 audit[848]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:57.048000 audit: CWD cwd="/" Dec 13 14:48:57.048000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:57.048000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:57.048000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:49:01.194000 audit: BPF prog-id=12 op=LOAD Dec 13 14:49:01.194000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:49:01.195000 audit: BPF prog-id=13 op=LOAD Dec 13 14:49:01.197000 audit: BPF prog-id=14 op=LOAD Dec 13 14:49:01.197000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:49:01.197000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:49:01.198000 audit: BPF prog-id=15 op=LOAD Dec 13 14:49:01.198000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:49:01.199000 audit: BPF prog-id=16 op=LOAD Dec 13 14:49:01.200000 audit: BPF prog-id=17 op=LOAD Dec 13 14:49:01.200000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:49:01.200000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:49:01.202000 audit: BPF prog-id=18 op=LOAD Dec 13 14:49:01.202000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:49:01.203000 audit: BPF prog-id=19 op=LOAD Dec 13 14:49:01.204000 audit: BPF prog-id=20 op=LOAD Dec 13 14:49:01.204000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:49:01.204000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:49:01.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.210000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:49:01.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.370000 audit: BPF prog-id=21 op=LOAD Dec 13 14:49:01.371000 audit: BPF prog-id=22 op=LOAD Dec 13 14:49:01.371000 audit: BPF prog-id=23 op=LOAD Dec 13 14:49:01.371000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:49:01.371000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:49:01.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.417000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:49:01.417000 audit[933]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd377afc80 a2=4000 a3=7ffd377afd1c items=0 ppid=1 pid=933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:01.417000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:49:01.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.193215 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:48:57.038851 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:01.431682 kernel: fuse: init (API version 7.34) Dec 13 14:49:01.193228 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:48:57.039973 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:49:01.205270 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:48:57.040026 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:49:01.428216 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:48:57.040112 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:49:01.428328 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:48:57.040142 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:49:01.429995 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:48:57.040217 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:49:01.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.431138 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:48:57.040252 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:49:01.431254 systemd[1]: Finished modprobe@loop.service. Dec 13 14:48:57.040753 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:48:57.040857 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:48:57.040923 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:48:57.042230 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:48:57.042320 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:48:57.042369 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:49:01.433738 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:48:57.042411 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:48:57.042456 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:48:57.042494 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:48:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:49:01.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:00.805770 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:49:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:00.806335 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:49:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:00.806595 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:49:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:00.807093 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:49:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:00.807226 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:49:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:49:00.807382 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-12-13T14:49:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:49:01.434877 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:49:01.435005 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:49:01.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.435775 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:49:01.436487 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:49:01.437561 systemd[1]: Reached target network-pre.target. Dec 13 14:49:01.439172 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:49:01.443474 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:49:01.446073 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:49:01.449132 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:49:01.453784 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:49:01.454371 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:01.455433 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:49:01.455990 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:01.457006 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:49:01.459253 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:49:01.461050 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:49:01.464219 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:49:01.468707 systemd-journald[933]: Time spent on flushing to /var/log/journal/8d485ec60d6d4d939bf3400562e02c71 is 34.034ms for 1095 entries. Dec 13 14:49:01.468707 systemd-journald[933]: System Journal (/var/log/journal/8d485ec60d6d4d939bf3400562e02c71) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:49:01.523627 systemd-journald[933]: Received client request to flush runtime journal. Dec 13 14:49:01.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.484912 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:49:01.485526 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:49:01.499289 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:49:01.515440 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:49:01.522297 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:49:01.524001 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:49:01.524747 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:49:01.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.534414 udevadm[957]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:49:02.172340 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:49:02.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:02.174000 audit: BPF prog-id=24 op=LOAD Dec 13 14:49:02.174000 audit: BPF prog-id=25 op=LOAD Dec 13 14:49:02.174000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:49:02.174000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:49:02.176303 systemd[1]: Starting systemd-udevd.service... Dec 13 14:49:02.216319 systemd-udevd[958]: Using default interface naming scheme 'v252'. Dec 13 14:49:02.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:02.279000 audit: BPF prog-id=26 op=LOAD Dec 13 14:49:02.275686 systemd[1]: Started systemd-udevd.service. Dec 13 14:49:02.285257 systemd[1]: Starting systemd-networkd.service... Dec 13 14:49:02.306000 audit: BPF prog-id=27 op=LOAD Dec 13 14:49:02.307000 audit: BPF prog-id=28 op=LOAD Dec 13 14:49:02.307000 audit: BPF prog-id=29 op=LOAD Dec 13 14:49:02.309013 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:49:02.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:02.357085 systemd[1]: Started systemd-userdbd.service. Dec 13 14:49:02.367971 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:49:02.395035 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:49:02.455658 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:49:02.461678 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:49:02.528000 audit[962]: AVC avc: denied { confidentiality } for pid=962 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:49:02.528000 audit[962]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d406d28380 a1=337fc a2=7f6aefc72bc5 a3=5 items=110 ppid=958 pid=962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:02.528000 audit: CWD cwd="/" Dec 13 14:49:02.528000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=1 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=2 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=3 name=(null) inode=13730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=4 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=5 name=(null) inode=13731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=6 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=7 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=8 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=9 name=(null) inode=13733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=10 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=11 name=(null) inode=13734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=12 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=13 name=(null) inode=13735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=14 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=15 name=(null) inode=13736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=16 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=17 name=(null) inode=13737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=18 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=19 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=20 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=21 name=(null) inode=13739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=22 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=23 name=(null) inode=13740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=24 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=25 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=26 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=27 name=(null) inode=13742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=28 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=29 name=(null) inode=13743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=30 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=31 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=32 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=33 name=(null) inode=13745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=34 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=35 name=(null) inode=13746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=36 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=37 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=38 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=39 name=(null) inode=13748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=40 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=41 name=(null) inode=13749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=42 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=43 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=44 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=45 name=(null) inode=13751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=46 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=47 name=(null) inode=13752 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=48 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=49 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=50 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=51 name=(null) inode=13754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=52 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=53 name=(null) inode=13755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=55 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=56 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=57 name=(null) inode=13757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=58 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=59 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=60 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=61 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=62 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=63 name=(null) inode=13760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=64 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=65 name=(null) inode=13761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=66 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=67 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=68 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=69 name=(null) inode=13763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=70 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=71 name=(null) inode=13764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=72 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=73 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=74 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=75 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=76 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=77 name=(null) inode=13767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=78 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=79 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=80 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=81 name=(null) inode=13769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=82 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=83 name=(null) inode=13770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=84 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=85 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=86 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=87 name=(null) inode=13772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=88 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=89 name=(null) inode=13773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=90 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=91 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=92 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=93 name=(null) inode=13775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=94 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=95 name=(null) inode=13776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=96 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=97 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=98 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=99 name=(null) inode=13778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=100 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=101 name=(null) inode=13779 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=102 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=103 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=104 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=105 name=(null) inode=13781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=106 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=107 name=(null) inode=13782 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PATH item=109 name=(null) inode=13783 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:02.528000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:49:02.658277 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 14:49:02.673184 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:49:02.835710 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:49:02.920423 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:49:02.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:02.924471 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:49:03.086817 lvm[987]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:49:03.093541 systemd-networkd[968]: lo: Link UP Dec 13 14:49:03.094063 systemd-networkd[968]: lo: Gained carrier Dec 13 14:49:03.095212 systemd-networkd[968]: Enumeration completed Dec 13 14:49:03.095602 systemd[1]: Started systemd-networkd.service. Dec 13 14:49:03.095603 systemd-networkd[968]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:49:03.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.099469 systemd-networkd[968]: eth0: Link UP Dec 13 14:49:03.099503 systemd-networkd[968]: eth0: Gained carrier Dec 13 14:49:03.111831 systemd-networkd[968]: eth0: DHCPv4 address 172.24.4.107/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:49:03.133804 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:49:03.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.135248 systemd[1]: Reached target cryptsetup.target. Dec 13 14:49:03.139051 systemd[1]: Starting lvm2-activation.service... Dec 13 14:49:03.147725 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:49:03.190527 systemd[1]: Finished lvm2-activation.service. Dec 13 14:49:03.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.191947 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:49:03.193076 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:49:03.193144 systemd[1]: Reached target local-fs.target. Dec 13 14:49:03.194197 systemd[1]: Reached target machines.target. Dec 13 14:49:03.197859 systemd[1]: Starting ldconfig.service... Dec 13 14:49:03.200478 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:03.200575 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:03.203546 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:49:03.207304 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:49:03.211069 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:49:03.216506 systemd[1]: Starting systemd-sysext.service... Dec 13 14:49:03.241454 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:49:03.246086 systemd[1]: boot.automount: Got automount request for /boot, triggered by 990 (bootctl) Dec 13 14:49:03.248812 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:49:03.268840 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:49:03.269032 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:49:03.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.319796 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:49:03.327653 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:49:03.689558 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:49:03.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.690882 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:49:03.747757 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:49:03.781025 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:49:03.828444 (sd-sysext)[1006]: Using extensions 'kubernetes'. Dec 13 14:49:03.832024 (sd-sysext)[1006]: Merged extensions into '/usr'. Dec 13 14:49:03.861221 systemd-fsck[1003]: fsck.fat 4.2 (2021-01-31) Dec 13 14:49:03.861221 systemd-fsck[1003]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:49:03.881293 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:49:03.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.891229 systemd[1]: Mounting boot.mount... Dec 13 14:49:03.893217 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:03.896036 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:49:03.898961 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:03.900939 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:03.902896 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:03.906032 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:03.907182 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:03.907634 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:03.908012 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:03.910438 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:03.911409 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:03.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.915244 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:49:03.916968 systemd[1]: Finished systemd-sysext.service. Dec 13 14:49:03.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.923456 systemd[1]: Mounted boot.mount. Dec 13 14:49:03.924154 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:03.924272 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:03.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.925021 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:03.925133 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:03.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.928255 systemd[1]: Starting ensure-sysext.service... Dec 13 14:49:03.928772 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:03.928835 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:03.930257 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:49:03.941457 systemd[1]: Reloading. Dec 13 14:49:03.968522 systemd-tmpfiles[1014]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:49:03.981560 systemd-tmpfiles[1014]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:49:03.995645 systemd-tmpfiles[1014]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:49:04.041964 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-12-13T14:49:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:04.042293 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-12-13T14:49:04Z" level=info msg="torcx already run" Dec 13 14:49:04.147545 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:04.147745 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:04.175295 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:04.248000 audit: BPF prog-id=30 op=LOAD Dec 13 14:49:04.248000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:49:04.249000 audit: BPF prog-id=31 op=LOAD Dec 13 14:49:04.250000 audit: BPF prog-id=32 op=LOAD Dec 13 14:49:04.250000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:49:04.250000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:49:04.251000 audit: BPF prog-id=33 op=LOAD Dec 13 14:49:04.251000 audit: BPF prog-id=34 op=LOAD Dec 13 14:49:04.251000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:49:04.251000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:49:04.253000 audit: BPF prog-id=35 op=LOAD Dec 13 14:49:04.253000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:49:04.255000 audit: BPF prog-id=36 op=LOAD Dec 13 14:49:04.255000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:49:04.255000 audit: BPF prog-id=37 op=LOAD Dec 13 14:49:04.256000 audit: BPF prog-id=38 op=LOAD Dec 13 14:49:04.256000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:49:04.256000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:49:04.266508 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:49:04.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.269910 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:49:04.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.273874 systemd[1]: Starting audit-rules.service... Dec 13 14:49:04.275500 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:49:04.282000 audit: BPF prog-id=39 op=LOAD Dec 13 14:49:04.285000 audit: BPF prog-id=40 op=LOAD Dec 13 14:49:04.279392 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:49:04.284672 systemd[1]: Starting systemd-resolved.service... Dec 13 14:49:04.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.301821 ldconfig[989]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:49:04.288473 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:49:04.289994 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:49:04.290975 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:49:04.295286 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:49:04.297604 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:04.297849 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.300470 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:04.303060 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:04.305395 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:04.307433 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.307562 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:04.307725 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:49:04.307811 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:04.309032 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:04.309312 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:04.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.311370 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:04.311478 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:04.312284 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.315386 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:04.315639 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.317493 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:04.319923 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:04.320858 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.321323 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:04.321472 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:49:04.321582 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:04.323735 systemd[1]: Finished ldconfig.service. Dec 13 14:49:04.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.324791 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:04.324932 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:04.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.327124 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:04.327233 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:04.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.328097 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:04.331000 audit[1090]: SYSTEM_BOOT pid=1090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.334921 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:04.335205 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.336963 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:04.338952 systemd[1]: Starting modprobe@drm.service... Dec 13 14:49:04.342724 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:04.343302 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.343435 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:04.345042 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:49:04.346081 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:49:04.346206 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:04.348175 systemd[1]: Finished ensure-sysext.service. Dec 13 14:49:04.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.349662 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:49:04.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.352057 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:04.352175 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:04.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.353135 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:04.353246 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:04.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.354869 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.358344 systemd[1]: Starting systemd-update-done.service... Dec 13 14:49:04.364731 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:49:04.364855 systemd[1]: Finished modprobe@drm.service. Dec 13 14:49:04.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.365835 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:49:04.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.366530 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:04.366683 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:04.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.367248 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:04.368822 systemd[1]: Finished systemd-update-done.service. Dec 13 14:49:04.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.390000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:49:04.390000 audit[1110]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe9ac89f20 a2=420 a3=0 items=0 ppid=1081 pid=1110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.390000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:49:04.391289 augenrules[1110]: No rules Dec 13 14:49:04.391378 systemd[1]: Finished audit-rules.service. Dec 13 14:49:04.403504 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:49:04.404049 systemd[1]: Reached target time-set.target. Dec 13 14:49:04.414973 systemd-timesyncd[1089]: Contacted time server 212.83.158.83:123 (0.flatcar.pool.ntp.org). Dec 13 14:49:04.415075 systemd-timesyncd[1089]: Initial clock synchronization to Fri 2024-12-13 14:49:04.366082 UTC. Dec 13 14:49:04.418800 systemd-resolved[1085]: Positive Trust Anchors: Dec 13 14:49:04.418999 systemd-resolved[1085]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:49:04.419088 systemd-resolved[1085]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:49:04.426297 systemd-resolved[1085]: Using system hostname 'ci-3510-3-6-8-1e1565123f.novalocal'. Dec 13 14:49:04.427783 systemd[1]: Started systemd-resolved.service. Dec 13 14:49:04.428280 systemd[1]: Reached target network.target. Dec 13 14:49:04.428707 systemd[1]: Reached target nss-lookup.target. Dec 13 14:49:04.429135 systemd[1]: Reached target sysinit.target. Dec 13 14:49:04.429624 systemd[1]: Started motdgen.path. Dec 13 14:49:04.430036 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:49:04.430650 systemd[1]: Started logrotate.timer. Dec 13 14:49:04.431161 systemd[1]: Started mdadm.timer. Dec 13 14:49:04.431548 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:49:04.431987 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:49:04.432016 systemd[1]: Reached target paths.target. Dec 13 14:49:04.432405 systemd[1]: Reached target timers.target. Dec 13 14:49:04.433065 systemd[1]: Listening on dbus.socket. Dec 13 14:49:04.434420 systemd[1]: Starting docker.socket... Dec 13 14:49:04.437898 systemd[1]: Listening on sshd.socket. Dec 13 14:49:04.438508 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:04.438910 systemd[1]: Listening on docker.socket. Dec 13 14:49:04.439492 systemd[1]: Reached target sockets.target. Dec 13 14:49:04.440000 systemd[1]: Reached target basic.target. Dec 13 14:49:04.440507 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.440533 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:49:04.441633 systemd[1]: Starting containerd.service... Dec 13 14:49:04.443182 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:49:04.444786 systemd[1]: Starting dbus.service... Dec 13 14:49:04.446751 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:49:04.449418 systemd[1]: Starting extend-filesystems.service... Dec 13 14:49:04.450549 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:49:04.453748 systemd[1]: Starting motdgen.service... Dec 13 14:49:04.471874 jq[1124]: false Dec 13 14:49:04.455523 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:49:04.459598 systemd[1]: Starting sshd-keygen.service... Dec 13 14:49:04.465781 systemd[1]: Starting systemd-logind.service... Dec 13 14:49:04.466303 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:04.466380 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:49:04.466899 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:49:04.467688 systemd[1]: Starting update-engine.service... Dec 13 14:49:04.471470 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:49:04.474219 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:49:04.474381 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:49:04.486037 jq[1132]: true Dec 13 14:49:04.500855 extend-filesystems[1125]: Found loop1 Dec 13 14:49:04.500966 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:49:04.501190 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:49:04.507071 jq[1140]: true Dec 13 14:49:04.512754 extend-filesystems[1125]: Found vda Dec 13 14:49:04.513726 extend-filesystems[1125]: Found vda1 Dec 13 14:49:04.514327 extend-filesystems[1125]: Found vda2 Dec 13 14:49:04.515526 extend-filesystems[1125]: Found vda3 Dec 13 14:49:04.516595 extend-filesystems[1125]: Found usr Dec 13 14:49:04.516595 extend-filesystems[1125]: Found vda4 Dec 13 14:49:04.516595 extend-filesystems[1125]: Found vda6 Dec 13 14:49:04.516595 extend-filesystems[1125]: Found vda7 Dec 13 14:49:04.516595 extend-filesystems[1125]: Found vda9 Dec 13 14:49:04.516595 extend-filesystems[1125]: Checking size of /dev/vda9 Dec 13 14:49:04.532449 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:49:04.532600 systemd[1]: Finished motdgen.service. Dec 13 14:49:04.538457 extend-filesystems[1125]: Resized partition /dev/vda9 Dec 13 14:49:04.544307 dbus-daemon[1121]: [system] SELinux support is enabled Dec 13 14:49:04.544446 systemd[1]: Started dbus.service. Dec 13 14:49:04.546885 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:49:04.546915 systemd[1]: Reached target system-config.target. Dec 13 14:49:04.547412 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:49:04.547433 systemd[1]: Reached target user-config.target. Dec 13 14:49:04.562132 extend-filesystems[1172]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:49:04.685682 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 14:49:04.720659 env[1136]: time="2024-12-13T14:49:04.720516836Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:49:04.782245 env[1136]: time="2024-12-13T14:49:04.782086269Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:49:04.782805 env[1136]: time="2024-12-13T14:49:04.782760464Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:49:04.788145 env[1136]: time="2024-12-13T14:49:04.788066385Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:49:04.788350 env[1136]: time="2024-12-13T14:49:04.788309791Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:49:04.788984 env[1136]: time="2024-12-13T14:49:04.788926117Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:49:04.789236 env[1136]: time="2024-12-13T14:49:04.789193158Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:49:04.789418 env[1136]: time="2024-12-13T14:49:04.789377764Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:49:04.789571 env[1136]: time="2024-12-13T14:49:04.789530280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:49:04.789912 env[1136]: time="2024-12-13T14:49:04.789879656Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:49:04.790403 env[1136]: time="2024-12-13T14:49:04.790369635Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:49:04.790773 env[1136]: time="2024-12-13T14:49:04.790731864Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:49:04.790902 env[1136]: time="2024-12-13T14:49:04.790875313Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:49:04.791134 env[1136]: time="2024-12-13T14:49:04.791099824Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:49:04.791305 env[1136]: time="2024-12-13T14:49:04.791277768Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:49:04.839755 systemd-logind[1129]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:49:04.839778 systemd-logind[1129]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:49:04.839911 systemd-networkd[968]: eth0: Gained IPv6LL Dec 13 14:49:04.839972 systemd-logind[1129]: New seat seat0. Dec 13 14:49:04.843715 systemd[1]: Started systemd-logind.service. Dec 13 14:49:04.845913 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:49:04.846856 systemd[1]: Reached target network-online.target. Dec 13 14:49:04.855860 systemd[1]: Starting kubelet.service... Dec 13 14:49:04.898081 update_engine[1130]: I1213 14:49:04.896999 1130 main.cc:92] Flatcar Update Engine starting Dec 13 14:49:04.954395 update_engine[1130]: I1213 14:49:04.911003 1130 update_check_scheduler.cc:74] Next update check in 2m20s Dec 13 14:49:04.903403 systemd[1]: Started update-engine.service. Dec 13 14:49:04.912052 systemd[1]: Started locksmithd.service. Dec 13 14:49:04.974540 env[1136]: time="2024-12-13T14:49:04.974314704Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:49:04.974540 env[1136]: time="2024-12-13T14:49:04.974458243Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974692111Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974770729Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974800324Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974818909Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974858904Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974877770Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974904600Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.974985912Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.975024054Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.975123 env[1136]: time="2024-12-13T14:49:04.975049101Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.979722085Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.979815420Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980147763Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980178201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980193900Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980249304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980265665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980279571Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980292254Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980306150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980320187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980339743Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980353730Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980370722Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:49:04.981081 env[1136]: time="2024-12-13T14:49:04.980514792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980533667Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980547814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980560838Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980586697Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980599861Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980642411Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:49:04.981503 env[1136]: time="2024-12-13T14:49:04.980689810Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:49:04.982988 systemd[1]: Started containerd.service. Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.981010311Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.981742154Z" level=info msg="Connect containerd service" Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.981792087Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.982354843Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.982723534Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.982771013Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:49:04.983767 env[1136]: time="2024-12-13T14:49:04.982830805Z" level=info msg="containerd successfully booted in 0.378104s" Dec 13 14:49:04.986911 bash[1171]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:49:04.986470 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:49:04.994632 env[1136]: time="2024-12-13T14:49:04.993891700Z" level=info msg="Start subscribing containerd event" Dec 13 14:49:04.994632 env[1136]: time="2024-12-13T14:49:04.994145917Z" level=info msg="Start recovering state" Dec 13 14:49:04.994632 env[1136]: time="2024-12-13T14:49:04.994230546Z" level=info msg="Start event monitor" Dec 13 14:49:04.994632 env[1136]: time="2024-12-13T14:49:04.994252266Z" level=info msg="Start snapshots syncer" Dec 13 14:49:04.994632 env[1136]: time="2024-12-13T14:49:04.994271422Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:49:04.994632 env[1136]: time="2024-12-13T14:49:04.994281551Z" level=info msg="Start streaming server" Dec 13 14:49:05.006702 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 14:49:05.276881 extend-filesystems[1172]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:49:05.276881 extend-filesystems[1172]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 14:49:05.276881 extend-filesystems[1172]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 14:49:05.290588 extend-filesystems[1125]: Resized filesystem in /dev/vda9 Dec 13 14:49:05.278316 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:49:05.278687 systemd[1]: Finished extend-filesystems.service. Dec 13 14:49:05.584303 sshd_keygen[1147]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:49:05.611893 systemd[1]: Finished sshd-keygen.service. Dec 13 14:49:05.614132 systemd[1]: Starting issuegen.service... Dec 13 14:49:05.621357 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:49:05.621534 systemd[1]: Finished issuegen.service. Dec 13 14:49:05.623677 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:49:05.648497 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:49:05.650122 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:49:05.652093 systemd[1]: Started getty@tty1.service. Dec 13 14:49:05.653667 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:49:05.654303 systemd[1]: Reached target getty.target. Dec 13 14:49:09.088375 systemd[1]: Started kubelet.service. Dec 13 14:49:11.354445 kubelet[1202]: E1213 14:49:11.354324 1202 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:49:11.359055 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:49:11.359330 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:49:11.359868 systemd[1]: kubelet.service: Consumed 2.616s CPU time. Dec 13 14:49:11.566275 coreos-metadata[1120]: Dec 13 14:49:11.566 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:49:11.708740 coreos-metadata[1120]: Dec 13 14:49:11.708 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 14:49:11.865354 coreos-metadata[1120]: Dec 13 14:49:11.865 INFO Fetch successful Dec 13 14:49:11.865564 coreos-metadata[1120]: Dec 13 14:49:11.865 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:49:11.880748 coreos-metadata[1120]: Dec 13 14:49:11.880 INFO Fetch successful Dec 13 14:49:11.886195 unknown[1120]: wrote ssh authorized keys file for user: core Dec 13 14:49:11.920100 update-ssh-keys[1211]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:49:11.921771 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:49:11.922587 systemd[1]: Reached target multi-user.target. Dec 13 14:49:11.925537 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:49:11.945046 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:49:11.945387 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:49:11.946433 systemd[1]: Startup finished in 973ms (kernel) + 6.875s (initrd) + 15.329s (userspace) = 23.177s. Dec 13 14:49:14.483002 systemd[1]: Created slice system-sshd.slice. Dec 13 14:49:14.486443 systemd[1]: Started sshd@0-172.24.4.107:22-172.24.4.1:38296.service. Dec 13 14:49:15.671908 sshd[1214]: Accepted publickey for core from 172.24.4.1 port 38296 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:15.676287 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:15.702346 systemd[1]: Created slice user-500.slice. Dec 13 14:49:15.705043 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:49:15.715409 systemd-logind[1129]: New session 1 of user core. Dec 13 14:49:15.732764 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:49:15.738147 systemd[1]: Starting user@500.service... Dec 13 14:49:15.745421 (systemd)[1217]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:15.869202 systemd[1217]: Queued start job for default target default.target. Dec 13 14:49:15.870142 systemd[1217]: Reached target paths.target. Dec 13 14:49:15.870264 systemd[1217]: Reached target sockets.target. Dec 13 14:49:15.870357 systemd[1217]: Reached target timers.target. Dec 13 14:49:15.870445 systemd[1217]: Reached target basic.target. Dec 13 14:49:15.870565 systemd[1217]: Reached target default.target. Dec 13 14:49:15.870693 systemd[1217]: Startup finished in 111ms. Dec 13 14:49:15.871068 systemd[1]: Started user@500.service. Dec 13 14:49:15.875138 systemd[1]: Started session-1.scope. Dec 13 14:49:16.363223 systemd[1]: Started sshd@1-172.24.4.107:22-172.24.4.1:53350.service. Dec 13 14:49:17.962244 sshd[1226]: Accepted publickey for core from 172.24.4.1 port 53350 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:17.969590 sshd[1226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:17.982146 systemd[1]: Started session-2.scope. Dec 13 14:49:17.983254 systemd-logind[1129]: New session 2 of user core. Dec 13 14:49:18.606358 sshd[1226]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:18.613495 systemd[1]: Started sshd@2-172.24.4.107:22-172.24.4.1:53366.service. Dec 13 14:49:18.618059 systemd[1]: sshd@1-172.24.4.107:22-172.24.4.1:53350.service: Deactivated successfully. Dec 13 14:49:18.619816 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:49:18.622487 systemd-logind[1129]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:49:18.625378 systemd-logind[1129]: Removed session 2. Dec 13 14:49:19.739673 sshd[1231]: Accepted publickey for core from 172.24.4.1 port 53366 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:19.742350 sshd[1231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:19.754260 systemd[1]: Started session-3.scope. Dec 13 14:49:19.755427 systemd-logind[1129]: New session 3 of user core. Dec 13 14:49:20.383283 sshd[1231]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:20.390009 systemd[1]: Started sshd@3-172.24.4.107:22-172.24.4.1:53378.service. Dec 13 14:49:20.394353 systemd[1]: sshd@2-172.24.4.107:22-172.24.4.1:53366.service: Deactivated successfully. Dec 13 14:49:20.396011 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:49:20.398084 systemd-logind[1129]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:49:20.400558 systemd-logind[1129]: Removed session 3. Dec 13 14:49:21.575318 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:49:21.575935 systemd[1]: Stopped kubelet.service. Dec 13 14:49:21.576013 systemd[1]: kubelet.service: Consumed 2.616s CPU time. Dec 13 14:49:21.579585 systemd[1]: Starting kubelet.service... Dec 13 14:49:21.869736 sshd[1237]: Accepted publickey for core from 172.24.4.1 port 53378 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:21.869117 sshd[1237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:21.882630 systemd-logind[1129]: New session 4 of user core. Dec 13 14:49:21.882821 systemd[1]: Started session-4.scope. Dec 13 14:49:21.919748 systemd[1]: Started kubelet.service. Dec 13 14:49:22.239369 kubelet[1245]: E1213 14:49:22.239154 1245 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:49:22.247474 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:49:22.247832 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:49:22.613979 sshd[1237]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:22.619991 systemd[1]: Started sshd@4-172.24.4.107:22-172.24.4.1:53394.service. Dec 13 14:49:22.621164 systemd[1]: sshd@3-172.24.4.107:22-172.24.4.1:53378.service: Deactivated successfully. Dec 13 14:49:22.625220 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:49:22.628129 systemd-logind[1129]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:49:22.631147 systemd-logind[1129]: Removed session 4. Dec 13 14:49:24.137137 sshd[1254]: Accepted publickey for core from 172.24.4.1 port 53394 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:24.140312 sshd[1254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:24.151981 systemd[1]: Started session-5.scope. Dec 13 14:49:24.153728 systemd-logind[1129]: New session 5 of user core. Dec 13 14:49:24.733448 sudo[1258]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:49:24.734015 sudo[1258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:49:24.749499 dbus-daemon[1121]: ЭùtU: received setenforce notice (enforcing=2133134528) Dec 13 14:49:24.749943 sudo[1258]: pam_unix(sudo:session): session closed for user root Dec 13 14:49:24.972232 sshd[1254]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:24.978775 systemd[1]: Started sshd@5-172.24.4.107:22-172.24.4.1:37030.service. Dec 13 14:49:24.984097 systemd[1]: sshd@4-172.24.4.107:22-172.24.4.1:53394.service: Deactivated successfully. Dec 13 14:49:24.985653 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:49:24.989465 systemd-logind[1129]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:49:24.992536 systemd-logind[1129]: Removed session 5. Dec 13 14:49:26.220743 sshd[1261]: Accepted publickey for core from 172.24.4.1 port 37030 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:26.224071 sshd[1261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:26.233973 systemd-logind[1129]: New session 6 of user core. Dec 13 14:49:26.234504 systemd[1]: Started session-6.scope. Dec 13 14:49:26.582064 sudo[1266]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:49:26.583310 sudo[1266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:49:26.589338 sudo[1266]: pam_unix(sudo:session): session closed for user root Dec 13 14:49:26.599687 sudo[1265]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:49:26.600227 sudo[1265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:49:26.621819 systemd[1]: Stopping audit-rules.service... Dec 13 14:49:26.622000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:49:26.624271 auditctl[1269]: No rules Dec 13 14:49:26.625385 kernel: kauditd_printk_skb: 236 callbacks suppressed Dec 13 14:49:26.625517 kernel: audit: type=1305 audit(1734101366.622:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:49:26.626288 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:49:26.626895 systemd[1]: Stopped audit-rules.service. Dec 13 14:49:26.638659 kernel: audit: type=1300 audit(1734101366.622:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd713cd1f0 a2=420 a3=0 items=0 ppid=1 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:26.622000 audit[1269]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd713cd1f0 a2=420 a3=0 items=0 ppid=1 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:26.634946 systemd[1]: Starting audit-rules.service... Dec 13 14:49:26.622000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:49:26.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.653523 kernel: audit: type=1327 audit(1734101366.622:217): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:49:26.653707 kernel: audit: type=1131 audit(1734101366.626:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.681255 augenrules[1286]: No rules Dec 13 14:49:26.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.683060 systemd[1]: Finished audit-rules.service. Dec 13 14:49:26.685270 sudo[1265]: pam_unix(sudo:session): session closed for user root Dec 13 14:49:26.684000 audit[1265]: USER_END pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.709996 kernel: audit: type=1130 audit(1734101366.682:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.710177 kernel: audit: type=1106 audit(1734101366.684:220): pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.710234 kernel: audit: type=1104 audit(1734101366.685:221): pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:26.685000 audit[1265]: CRED_DISP pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:27.010475 sshd[1261]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:27.013000 audit[1261]: USER_END pid=1261 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:27.019223 systemd[1]: Started sshd@6-172.24.4.107:22-172.24.4.1:37038.service. Dec 13 14:49:27.026946 systemd[1]: sshd@5-172.24.4.107:22-172.24.4.1:37030.service: Deactivated successfully. Dec 13 14:49:27.028347 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:49:27.033861 kernel: audit: type=1106 audit(1734101367.013:222): pid=1261 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:27.014000 audit[1261]: CRED_DISP pid=1261 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:27.044898 kernel: audit: type=1104 audit(1734101367.014:223): pid=1261 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:27.044705 systemd-logind[1129]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:49:27.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.107:22-172.24.4.1:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:27.056740 kernel: audit: type=1130 audit(1734101367.024:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.107:22-172.24.4.1:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:27.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.107:22-172.24.4.1:37030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:27.056871 systemd-logind[1129]: Removed session 6. Dec 13 14:49:28.171000 audit[1291]: USER_ACCT pid=1291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:28.172374 sshd[1291]: Accepted publickey for core from 172.24.4.1 port 37038 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:49:28.173000 audit[1291]: CRED_ACQ pid=1291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:28.173000 audit[1291]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd58228fa0 a2=3 a3=0 items=0 ppid=1 pid=1291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:49:28.175588 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:49:28.186008 systemd-logind[1129]: New session 7 of user core. Dec 13 14:49:28.186612 systemd[1]: Started session-7.scope. Dec 13 14:49:28.198000 audit[1291]: USER_START pid=1291 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:28.201000 audit[1294]: CRED_ACQ pid=1294 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:28.647000 audit[1295]: USER_ACCT pid=1295 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:28.649789 sudo[1295]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:49:28.649000 audit[1295]: CRED_REFR pid=1295 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:28.651284 sudo[1295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:49:28.653000 audit[1295]: USER_START pid=1295 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:28.679837 systemd[1]: Starting coreos-metadata.service... Dec 13 14:49:32.499529 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:49:32.500338 systemd[1]: Stopped kubelet.service. Dec 13 14:49:32.511824 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 14:49:32.511951 kernel: audit: type=1130 audit(1734101372.499:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:32.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:32.503432 systemd[1]: Starting kubelet.service... Dec 13 14:49:32.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:32.522677 kernel: audit: type=1131 audit(1734101372.499:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:32.853848 systemd[1]: Started kubelet.service. Dec 13 14:49:32.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:32.864685 kernel: audit: type=1130 audit(1734101372.853:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:32.955744 kubelet[1308]: E1213 14:49:32.955487 1308 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:49:32.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:49:32.959067 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:49:32.959274 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:49:32.963672 kernel: audit: type=1131 audit(1734101372.958:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:49:35.743505 coreos-metadata[1299]: Dec 13 14:49:35.743 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:49:35.836020 coreos-metadata[1299]: Dec 13 14:49:35.835 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:49:36.052760 coreos-metadata[1299]: Dec 13 14:49:36.052 INFO Fetch successful Dec 13 14:49:36.053297 coreos-metadata[1299]: Dec 13 14:49:36.053 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Dec 13 14:49:36.069150 coreos-metadata[1299]: Dec 13 14:49:36.068 INFO Fetch successful Dec 13 14:49:36.069474 coreos-metadata[1299]: Dec 13 14:49:36.069 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Dec 13 14:49:36.085197 coreos-metadata[1299]: Dec 13 14:49:36.085 INFO Fetch successful Dec 13 14:49:36.085511 coreos-metadata[1299]: Dec 13 14:49:36.085 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Dec 13 14:49:36.099176 coreos-metadata[1299]: Dec 13 14:49:36.098 INFO Fetch successful Dec 13 14:49:36.099495 coreos-metadata[1299]: Dec 13 14:49:36.099 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Dec 13 14:49:36.113934 coreos-metadata[1299]: Dec 13 14:49:36.113 INFO Fetch successful Dec 13 14:49:36.131278 systemd[1]: Finished coreos-metadata.service. Dec 13 14:49:36.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:36.143679 kernel: audit: type=1130 audit(1734101376.130:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.881292 systemd[1]: Stopped kubelet.service. Dec 13 14:49:37.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.891125 systemd[1]: Starting kubelet.service... Dec 13 14:49:37.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.901514 kernel: audit: type=1130 audit(1734101377.881:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.901635 kernel: audit: type=1131 audit(1734101377.881:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.928691 systemd[1]: Reloading. Dec 13 14:49:38.056748 /usr/lib/systemd/system-generators/torcx-generator[1373]: time="2024-12-13T14:49:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:38.060565 /usr/lib/systemd/system-generators/torcx-generator[1373]: time="2024-12-13T14:49:38Z" level=info msg="torcx already run" Dec 13 14:49:38.424501 kernel: audit: type=1400 audit(1734101378.405:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.424736 kernel: audit: type=1400 audit(1734101378.405:242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.307521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:38.307541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:38.330578 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.434912 kernel: audit: type=1400 audit(1734101378.405:243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.452088 kernel: audit: type=1400 audit(1734101378.405:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.452201 kernel: audit: type=1400 audit(1734101378.405:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460931 kernel: audit: type=1400 audit(1734101378.405:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.474685 kernel: audit: type=1400 audit(1734101378.405:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.474824 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.413000 audit: BPF prog-id=46 op=LOAD Dec 13 14:49:38.413000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.422000 audit: BPF prog-id=47 op=LOAD Dec 13 14:49:38.422000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit: BPF prog-id=48 op=LOAD Dec 13 14:49:38.459000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit: BPF prog-id=49 op=LOAD Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.459000 audit: BPF prog-id=50 op=LOAD Dec 13 14:49:38.459000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:49:38.459000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.467000 audit: BPF prog-id=51 op=LOAD Dec 13 14:49:38.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:38.495293 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:49:38.495362 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:49:38.495639 systemd[1]: Stopped kubelet.service. Dec 13 14:49:38.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:49:38.497290 systemd[1]: Starting kubelet.service... Dec 13 14:49:39.016195 systemd[1]: Started kubelet.service. Dec 13 14:49:39.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.177900 kubelet[1423]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:49:39.177900 kubelet[1423]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:49:39.177900 kubelet[1423]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:49:39.178521 kubelet[1423]: I1213 14:49:39.177971 1423 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:49:40.144676 kubelet[1423]: I1213 14:49:40.144571 1423 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:49:40.144993 kubelet[1423]: I1213 14:49:40.144929 1423 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:49:40.145743 kubelet[1423]: I1213 14:49:40.145709 1423 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:49:40.422778 kubelet[1423]: I1213 14:49:40.422579 1423 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:49:40.443737 kubelet[1423]: I1213 14:49:40.443679 1423 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:49:40.444205 kubelet[1423]: I1213 14:49:40.444152 1423 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:49:40.444601 kubelet[1423]: I1213 14:49:40.444550 1423 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:49:40.444884 kubelet[1423]: I1213 14:49:40.444611 1423 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:49:40.444884 kubelet[1423]: I1213 14:49:40.444673 1423 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:49:40.445058 kubelet[1423]: I1213 14:49:40.444899 1423 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:49:40.445157 kubelet[1423]: I1213 14:49:40.445089 1423 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:49:40.445157 kubelet[1423]: I1213 14:49:40.445125 1423 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:49:40.445295 kubelet[1423]: I1213 14:49:40.445174 1423 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:49:40.445295 kubelet[1423]: I1213 14:49:40.445204 1423 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:49:40.446241 kubelet[1423]: E1213 14:49:40.446201 1423 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:40.446520 kubelet[1423]: E1213 14:49:40.446491 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:40.448747 kubelet[1423]: I1213 14:49:40.448709 1423 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:49:40.458953 kubelet[1423]: W1213 14:49:40.457921 1423 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "172.24.4.107" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:49:40.458953 kubelet[1423]: E1213 14:49:40.457988 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.107" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:49:40.459601 kubelet[1423]: I1213 14:49:40.459541 1423 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:49:40.463295 kubelet[1423]: W1213 14:49:40.463245 1423 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:49:40.464607 kubelet[1423]: I1213 14:49:40.464483 1423 server.go:1256] "Started kubelet" Dec 13 14:49:40.465607 kubelet[1423]: I1213 14:49:40.465570 1423 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:49:40.466443 kubelet[1423]: I1213 14:49:40.466411 1423 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:49:40.468000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:40.468000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:40.468000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad3dd0 a1=c000a7d4b8 a2=c000ad3da0 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.468000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:40.469940 kubelet[1423]: I1213 14:49:40.469908 1423 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:49:40.470171 kubelet[1423]: I1213 14:49:40.470142 1423 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:49:40.470446 kubelet[1423]: I1213 14:49:40.470417 1423 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:49:40.469000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:40.469000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:40.469000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b20b60 a1=c000a7d4d0 a2=c000ad3e60 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.469000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:40.477483 kubelet[1423]: W1213 14:49:40.477426 1423 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:49:40.479046 kubelet[1423]: E1213 14:49:40.477490 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:49:40.479418 kubelet[1423]: I1213 14:49:40.479350 1423 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:49:40.490724 kubelet[1423]: I1213 14:49:40.489853 1423 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:49:40.500237 kubelet[1423]: I1213 14:49:40.496250 1423 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:49:40.500237 kubelet[1423]: I1213 14:49:40.496416 1423 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:49:40.501565 kubelet[1423]: I1213 14:49:40.501525 1423 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:49:40.506960 kubelet[1423]: W1213 14:49:40.504573 1423 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:49:40.506960 kubelet[1423]: E1213 14:49:40.504677 1423 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:49:40.512891 kubelet[1423]: I1213 14:49:40.512236 1423 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:49:40.524351 kubelet[1423]: E1213 14:49:40.524305 1423 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.107\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:49:40.531441 kubelet[1423]: E1213 14:49:40.531409 1423 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.107.1810c4049318e4dc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.107,UID:172.24.4.107,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.24.4.107,},FirstTimestamp:2024-12-13 14:49:40.464436444 +0000 UTC m=+1.437640159,LastTimestamp:2024-12-13 14:49:40.464436444 +0000 UTC m=+1.437640159,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.107,}" Dec 13 14:49:40.531960 kubelet[1423]: E1213 14:49:40.531938 1423 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:49:40.534658 kubelet[1423]: I1213 14:49:40.534643 1423 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:49:40.534745 kubelet[1423]: I1213 14:49:40.534736 1423 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:49:40.539896 kubelet[1423]: E1213 14:49:40.539882 1423 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.107.1810c404971e7b35 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.107,UID:172.24.4.107,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.24.4.107,},FirstTimestamp:2024-12-13 14:49:40.531911477 +0000 UTC m=+1.505115172,LastTimestamp:2024-12-13 14:49:40.531911477 +0000 UTC m=+1.505115172,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.107,}" Dec 13 14:49:40.555940 kubelet[1423]: I1213 14:49:40.555921 1423 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:49:40.556114 kubelet[1423]: I1213 14:49:40.556103 1423 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:49:40.556205 kubelet[1423]: I1213 14:49:40.556195 1423 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:49:40.566340 kubelet[1423]: I1213 14:49:40.566300 1423 policy_none.go:49] "None policy: Start" Dec 13 14:49:40.566000 audit[1436]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.566000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc370b0600 a2=0 a3=7ffc370b05ec items=0 ppid=1423 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:49:40.567808 kubelet[1423]: I1213 14:49:40.567775 1423 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:49:40.567905 kubelet[1423]: I1213 14:49:40.567895 1423 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:49:40.567000 audit[1440]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.567000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffeaaa399e0 a2=0 a3=7ffeaaa399cc items=0 ppid=1423 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:49:40.575090 systemd[1]: Created slice kubepods.slice. Dec 13 14:49:40.580536 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:49:40.584023 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:49:40.590424 kubelet[1423]: I1213 14:49:40.590392 1423 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:49:40.589000 audit[1423]: AVC avc: denied { mac_admin } for pid=1423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:40.589000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:40.589000 audit[1423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d1e930 a1=c000b5efc0 a2=c000d1e900 a3=25 items=0 ppid=1 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.589000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:40.590916 kubelet[1423]: I1213 14:49:40.590902 1423 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:49:40.593034 kubelet[1423]: I1213 14:49:40.593019 1423 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:49:40.573000 audit[1442]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.573000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffee7fcb200 a2=0 a3=7ffee7fcb1ec items=0 ppid=1423 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:40.596452 kubelet[1423]: E1213 14:49:40.596436 1423 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.107\" not found" Dec 13 14:49:40.597000 audit[1448]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.597000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd8e3e67b0 a2=0 a3=7ffd8e3e679c items=0 ppid=1423 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:40.610428 kubelet[1423]: I1213 14:49:40.610292 1423 kubelet_node_status.go:73] "Attempting to register node" node="172.24.4.107" Dec 13 14:49:40.615696 kubelet[1423]: I1213 14:49:40.615681 1423 kubelet_node_status.go:76] "Successfully registered node" node="172.24.4.107" Dec 13 14:49:40.626394 kubelet[1423]: E1213 14:49:40.626375 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:40.663000 audit[1453]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.663000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdd1a67630 a2=0 a3=7ffdd1a6761c items=0 ppid=1423 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:49:40.666245 kubelet[1423]: I1213 14:49:40.666192 1423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:49:40.665000 audit[1455]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.665000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbed4b240 a2=0 a3=7ffcbed4b22c items=0 ppid=1423 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:49:40.666000 audit[1456]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.666000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcbf48e890 a2=0 a3=7ffcbf48e87c items=0 ppid=1423 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:49:40.668000 audit[1457]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:40.668000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff32f87380 a2=0 a3=7fff32f8736c items=0 ppid=1423 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:49:40.668000 audit[1454]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:40.668000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5df39570 a2=0 a3=7ffc5df3955c items=0 ppid=1423 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:49:40.670568 kubelet[1423]: I1213 14:49:40.670537 1423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:49:40.670690 kubelet[1423]: I1213 14:49:40.670666 1423 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:49:40.670735 kubelet[1423]: I1213 14:49:40.670724 1423 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:49:40.670938 kubelet[1423]: E1213 14:49:40.670915 1423 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:49:40.671000 audit[1458]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:40.671000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef8f77e40 a2=0 a3=7ffef8f77e2c items=0 ppid=1423 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:49:40.675000 audit[1459]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:40.675000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff1606d2d0 a2=0 a3=7fff1606d2bc items=0 ppid=1423 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:49:40.677000 audit[1460]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:40.677000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcfb1229b0 a2=0 a3=7ffcfb12299c items=0 ppid=1423 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:40.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:49:40.727344 kubelet[1423]: E1213 14:49:40.727309 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:40.827772 kubelet[1423]: E1213 14:49:40.827715 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:40.929694 kubelet[1423]: E1213 14:49:40.928850 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:41.029888 kubelet[1423]: E1213 14:49:41.029824 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:41.130947 kubelet[1423]: E1213 14:49:41.130900 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:41.150341 kubelet[1423]: I1213 14:49:41.150275 1423 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:49:41.150843 kubelet[1423]: W1213 14:49:41.150666 1423 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:49:41.231899 kubelet[1423]: E1213 14:49:41.231325 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:41.332400 kubelet[1423]: E1213 14:49:41.332263 1423 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.107\" not found" Dec 13 14:49:41.433384 kubelet[1423]: I1213 14:49:41.433322 1423 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:49:41.434956 env[1136]: time="2024-12-13T14:49:41.434729556Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:49:41.435497 kubelet[1423]: I1213 14:49:41.435137 1423 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:49:41.447862 kubelet[1423]: I1213 14:49:41.447714 1423 apiserver.go:52] "Watching apiserver" Dec 13 14:49:41.448127 kubelet[1423]: E1213 14:49:41.448093 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:41.459678 kubelet[1423]: I1213 14:49:41.459594 1423 topology_manager.go:215] "Topology Admit Handler" podUID="288add20-1b47-41cd-995d-fca300f12b3c" podNamespace="calico-system" podName="csi-node-driver-6gz2f" Dec 13 14:49:41.460110 kubelet[1423]: I1213 14:49:41.460074 1423 topology_manager.go:215] "Topology Admit Handler" podUID="822a0d94-4e88-4820-889b-84ef7500cb0f" podNamespace="kube-system" podName="kube-proxy-5rflg" Dec 13 14:49:41.460426 kubelet[1423]: I1213 14:49:41.460394 1423 topology_manager.go:215] "Topology Admit Handler" podUID="c4fa20d2-49d7-4590-9471-7fcf64ddbb79" podNamespace="calico-system" podName="calico-node-rkhdg" Dec 13 14:49:41.462520 kubelet[1423]: E1213 14:49:41.461330 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:41.484354 systemd[1]: Created slice kubepods-besteffort-pod822a0d94_4e88_4820_889b_84ef7500cb0f.slice. Dec 13 14:49:41.498468 kubelet[1423]: I1213 14:49:41.497979 1423 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:49:41.505722 kubelet[1423]: I1213 14:49:41.505508 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/822a0d94-4e88-4820-889b-84ef7500cb0f-kube-proxy\") pod \"kube-proxy-5rflg\" (UID: \"822a0d94-4e88-4820-889b-84ef7500cb0f\") " pod="kube-system/kube-proxy-5rflg" Dec 13 14:49:41.505722 kubelet[1423]: I1213 14:49:41.505668 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/822a0d94-4e88-4820-889b-84ef7500cb0f-lib-modules\") pod \"kube-proxy-5rflg\" (UID: \"822a0d94-4e88-4820-889b-84ef7500cb0f\") " pod="kube-system/kube-proxy-5rflg" Dec 13 14:49:41.505972 kubelet[1423]: I1213 14:49:41.505940 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t6dbk\" (UniqueName: \"kubernetes.io/projected/822a0d94-4e88-4820-889b-84ef7500cb0f-kube-api-access-t6dbk\") pod \"kube-proxy-5rflg\" (UID: \"822a0d94-4e88-4820-889b-84ef7500cb0f\") " pod="kube-system/kube-proxy-5rflg" Dec 13 14:49:41.506051 kubelet[1423]: I1213 14:49:41.506015 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-var-lib-calico\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506127 kubelet[1423]: I1213 14:49:41.506102 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-472ng\" (UniqueName: \"kubernetes.io/projected/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-kube-api-access-472ng\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506200 kubelet[1423]: I1213 14:49:41.506175 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-lib-modules\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506315 kubelet[1423]: I1213 14:49:41.506248 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-node-certs\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506400 kubelet[1423]: I1213 14:49:41.506323 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-var-run-calico\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506400 kubelet[1423]: I1213 14:49:41.506397 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-cni-bin-dir\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506535 kubelet[1423]: I1213 14:49:41.506461 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-cni-net-dir\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506654 kubelet[1423]: I1213 14:49:41.506542 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-flexvol-driver-host\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.506734 kubelet[1423]: I1213 14:49:41.506675 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/288add20-1b47-41cd-995d-fca300f12b3c-kubelet-dir\") pod \"csi-node-driver-6gz2f\" (UID: \"288add20-1b47-41cd-995d-fca300f12b3c\") " pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:49:41.506817 kubelet[1423]: I1213 14:49:41.506761 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/288add20-1b47-41cd-995d-fca300f12b3c-registration-dir\") pod \"csi-node-driver-6gz2f\" (UID: \"288add20-1b47-41cd-995d-fca300f12b3c\") " pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:49:41.506891 kubelet[1423]: I1213 14:49:41.506840 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/822a0d94-4e88-4820-889b-84ef7500cb0f-xtables-lock\") pod \"kube-proxy-5rflg\" (UID: \"822a0d94-4e88-4820-889b-84ef7500cb0f\") " pod="kube-system/kube-proxy-5rflg" Dec 13 14:49:41.506963 kubelet[1423]: I1213 14:49:41.506928 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-xtables-lock\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.507041 kubelet[1423]: I1213 14:49:41.506999 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-policysync\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.507114 kubelet[1423]: I1213 14:49:41.507075 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/288add20-1b47-41cd-995d-fca300f12b3c-varrun\") pod \"csi-node-driver-6gz2f\" (UID: \"288add20-1b47-41cd-995d-fca300f12b3c\") " pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:49:41.507186 kubelet[1423]: I1213 14:49:41.507156 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/288add20-1b47-41cd-995d-fca300f12b3c-socket-dir\") pod \"csi-node-driver-6gz2f\" (UID: \"288add20-1b47-41cd-995d-fca300f12b3c\") " pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:49:41.507257 kubelet[1423]: I1213 14:49:41.507234 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vzhxn\" (UniqueName: \"kubernetes.io/projected/288add20-1b47-41cd-995d-fca300f12b3c-kube-api-access-vzhxn\") pod \"csi-node-driver-6gz2f\" (UID: \"288add20-1b47-41cd-995d-fca300f12b3c\") " pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:49:41.507329 kubelet[1423]: I1213 14:49:41.507301 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-tigera-ca-bundle\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.507407 kubelet[1423]: I1213 14:49:41.507382 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c4fa20d2-49d7-4590-9471-7fcf64ddbb79-cni-log-dir\") pod \"calico-node-rkhdg\" (UID: \"c4fa20d2-49d7-4590-9471-7fcf64ddbb79\") " pod="calico-system/calico-node-rkhdg" Dec 13 14:49:41.513455 systemd[1]: Created slice kubepods-besteffort-podc4fa20d2_49d7_4590_9471_7fcf64ddbb79.slice. Dec 13 14:49:41.551000 audit[1295]: USER_END pid=1295 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.551000 audit[1295]: CRED_DISP pid=1295 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.552592 sudo[1295]: pam_unix(sudo:session): session closed for user root Dec 13 14:49:41.626014 kubelet[1423]: E1213 14:49:41.625301 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:41.626014 kubelet[1423]: W1213 14:49:41.625350 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:41.626014 kubelet[1423]: E1213 14:49:41.625406 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:41.652372 kubelet[1423]: E1213 14:49:41.652000 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:41.652372 kubelet[1423]: W1213 14:49:41.652044 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:41.652372 kubelet[1423]: E1213 14:49:41.652089 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:41.677675 kubelet[1423]: E1213 14:49:41.677611 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:41.677929 kubelet[1423]: W1213 14:49:41.677904 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:41.678115 kubelet[1423]: E1213 14:49:41.678094 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:41.678537 kubelet[1423]: E1213 14:49:41.678519 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:41.678694 kubelet[1423]: W1213 14:49:41.678672 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:41.678833 kubelet[1423]: E1213 14:49:41.678815 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:41.769389 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:41.773000 audit[1291]: USER_END pid=1291 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:41.773000 audit[1291]: CRED_DISP pid=1291 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:49:41.778463 systemd[1]: sshd@6-172.24.4.107:22-172.24.4.1:37038.service: Deactivated successfully. Dec 13 14:49:41.780081 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:49:41.780414 systemd[1]: session-7.scope: Consumed 1.106s CPU time. Dec 13 14:49:41.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.107:22-172.24.4.1:37038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.782558 systemd-logind[1129]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:49:41.785078 systemd-logind[1129]: Removed session 7. Dec 13 14:49:41.806435 env[1136]: time="2024-12-13T14:49:41.805762686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5rflg,Uid:822a0d94-4e88-4820-889b-84ef7500cb0f,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:41.825500 env[1136]: time="2024-12-13T14:49:41.825197167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rkhdg,Uid:c4fa20d2-49d7-4590-9471-7fcf64ddbb79,Namespace:calico-system,Attempt:0,}" Dec 13 14:49:42.448575 kubelet[1423]: E1213 14:49:42.448441 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:42.620904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1572225180.mount: Deactivated successfully. Dec 13 14:49:42.633451 env[1136]: time="2024-12-13T14:49:42.633307679Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.636420 env[1136]: time="2024-12-13T14:49:42.636357527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.639878 env[1136]: time="2024-12-13T14:49:42.639811268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.642803 env[1136]: time="2024-12-13T14:49:42.642751591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.645004 env[1136]: time="2024-12-13T14:49:42.644953304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.652130 env[1136]: time="2024-12-13T14:49:42.652080557Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.661125 env[1136]: time="2024-12-13T14:49:42.660910647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.664075 env[1136]: time="2024-12-13T14:49:42.664021822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:42.728173 env[1136]: time="2024-12-13T14:49:42.727963027Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:42.728173 env[1136]: time="2024-12-13T14:49:42.728013348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:42.728173 env[1136]: time="2024-12-13T14:49:42.728036435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:42.739629 env[1136]: time="2024-12-13T14:49:42.729255751Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:42.739629 env[1136]: time="2024-12-13T14:49:42.729286409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:42.739629 env[1136]: time="2024-12-13T14:49:42.729308344Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:42.739629 env[1136]: time="2024-12-13T14:49:42.729491727Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c pid=1487 runtime=io.containerd.runc.v2 Dec 13 14:49:42.739806 env[1136]: time="2024-12-13T14:49:42.728501657Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01386095e7620063c3d4f9a05d42a4cec95953546c63c6e8d96975d3c0e93d5e pid=1486 runtime=io.containerd.runc.v2 Dec 13 14:49:42.764417 systemd[1]: Started cri-containerd-01386095e7620063c3d4f9a05d42a4cec95953546c63c6e8d96975d3c0e93d5e.scope. Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.780000 audit: BPF prog-id=61 op=LOAD Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1486 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333836303935653736323030363363336434663961303564343261 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1486 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333836303935653736323030363363336434663961303564343261 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.781000 audit: BPF prog-id=62 op=LOAD Dec 13 14:49:42.781000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000389fc0 items=0 ppid=1486 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333836303935653736323030363363336434663961303564343261 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.782000 audit: BPF prog-id=63 op=LOAD Dec 13 14:49:42.782000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e4008 items=0 ppid=1486 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333836303935653736323030363363336434663961303564343261 Dec 13 14:49:42.783000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:49:42.783000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { perfmon } for pid=1506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit[1506]: AVC avc: denied { bpf } for pid=1506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.783000 audit: BPF prog-id=64 op=LOAD Dec 13 14:49:42.783000 audit[1506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e4418 items=0 ppid=1486 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031333836303935653736323030363363336434663961303564343261 Dec 13 14:49:42.791923 systemd[1]: Started cri-containerd-20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c.scope. Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.808000 audit: BPF prog-id=65 op=LOAD Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1487 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230623734313638373038653337363462383065616634323137383066 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1487 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230623734313638373038653337363462383065616634323137383066 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.809000 audit: BPF prog-id=66 op=LOAD Dec 13 14:49:42.809000 audit[1507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e0db0 items=0 ppid=1487 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230623734313638373038653337363462383065616634323137383066 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.810000 audit: BPF prog-id=67 op=LOAD Dec 13 14:49:42.810000 audit[1507]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e0df8 items=0 ppid=1487 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230623734313638373038653337363462383065616634323137383066 Dec 13 14:49:42.810000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:49:42.810000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { perfmon } for pid=1507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit[1507]: AVC avc: denied { bpf } for pid=1507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:42.811000 audit: BPF prog-id=68 op=LOAD Dec 13 14:49:42.811000 audit[1507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e1208 items=0 ppid=1487 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:42.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230623734313638373038653337363462383065616634323137383066 Dec 13 14:49:42.815303 env[1136]: time="2024-12-13T14:49:42.815247794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5rflg,Uid:822a0d94-4e88-4820-889b-84ef7500cb0f,Namespace:kube-system,Attempt:0,} returns sandbox id \"01386095e7620063c3d4f9a05d42a4cec95953546c63c6e8d96975d3c0e93d5e\"" Dec 13 14:49:42.821151 env[1136]: time="2024-12-13T14:49:42.820430003Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:49:42.828067 env[1136]: time="2024-12-13T14:49:42.828008616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rkhdg,Uid:c4fa20d2-49d7-4590-9471-7fcf64ddbb79,Namespace:calico-system,Attempt:0,} returns sandbox id \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\"" Dec 13 14:49:43.451010 kubelet[1423]: E1213 14:49:43.450935 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:43.672350 kubelet[1423]: E1213 14:49:43.671916 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:44.452142 kubelet[1423]: E1213 14:49:44.452024 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:44.712432 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2675811132.mount: Deactivated successfully. Dec 13 14:49:45.452355 kubelet[1423]: E1213 14:49:45.452247 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:45.618719 env[1136]: time="2024-12-13T14:49:45.618603830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:45.622157 env[1136]: time="2024-12-13T14:49:45.622105129Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:45.627014 env[1136]: time="2024-12-13T14:49:45.626967960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:45.631397 env[1136]: time="2024-12-13T14:49:45.631345501Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:45.633755 env[1136]: time="2024-12-13T14:49:45.633095640Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:49:45.636030 env[1136]: time="2024-12-13T14:49:45.635963306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:49:45.640137 env[1136]: time="2024-12-13T14:49:45.640072536Z" level=info msg="CreateContainer within sandbox \"01386095e7620063c3d4f9a05d42a4cec95953546c63c6e8d96975d3c0e93d5e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:49:45.660040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1539532550.mount: Deactivated successfully. Dec 13 14:49:45.670374 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount175428953.mount: Deactivated successfully. Dec 13 14:49:45.672045 kubelet[1423]: E1213 14:49:45.671602 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:45.674835 env[1136]: time="2024-12-13T14:49:45.674760639Z" level=info msg="CreateContainer within sandbox \"01386095e7620063c3d4f9a05d42a4cec95953546c63c6e8d96975d3c0e93d5e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"88587ff72b19890a83ac633b5ad5c0ed6344e048214bfaf12eec7b804b23a413\"" Dec 13 14:49:45.675769 env[1136]: time="2024-12-13T14:49:45.675676916Z" level=info msg="StartContainer for \"88587ff72b19890a83ac633b5ad5c0ed6344e048214bfaf12eec7b804b23a413\"" Dec 13 14:49:45.703384 systemd[1]: Started cri-containerd-88587ff72b19890a83ac633b5ad5c0ed6344e048214bfaf12eec7b804b23a413.scope. Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.736428 kernel: kauditd_printk_skb: 531 callbacks suppressed Dec 13 14:49:45.736509 kernel: audit: type=1400 audit(1734101385.734:372): avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3a43fc0d88 items=0 ppid=1486 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.744788 kernel: audit: type=1300 audit(1734101385.734:372): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3a43fc0d88 items=0 ppid=1486 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353837666637326231393839306138336163363333623561643563 Dec 13 14:49:45.749766 kernel: audit: type=1327 audit(1734101385.734:372): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353837666637326231393839306138336163363333623561643563 Dec 13 14:49:45.749831 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.753044 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.759703 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.759746 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.770769 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.770812 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.774512 kernel: audit: type=1400 audit(1734101385.734:373): avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.734000 audit: BPF prog-id=69 op=LOAD Dec 13 14:49:45.734000 audit[1565]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000094618 items=0 ppid=1486 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353837666637326231393839306138336163363333623561643563 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit: BPF prog-id=70 op=LOAD Dec 13 14:49:45.744000 audit[1565]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000094668 items=0 ppid=1486 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353837666637326231393839306138336163363333623561643563 Dec 13 14:49:45.744000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:49:45.744000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { perfmon } for pid=1565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit[1565]: AVC avc: denied { bpf } for pid=1565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:45.744000 audit: BPF prog-id=71 op=LOAD Dec 13 14:49:45.744000 audit[1565]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000946f8 items=0 ppid=1486 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353837666637326231393839306138336163363333623561643563 Dec 13 14:49:45.792711 env[1136]: time="2024-12-13T14:49:45.792669751Z" level=info msg="StartContainer for \"88587ff72b19890a83ac633b5ad5c0ed6344e048214bfaf12eec7b804b23a413\" returns successfully" Dec 13 14:49:45.855000 audit[1616]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.855000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe110bda80 a2=0 a3=7ffe110bda6c items=0 ppid=1576 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:49:45.858000 audit[1617]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:45.858000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca0d328d0 a2=0 a3=7ffca0d328bc items=0 ppid=1576 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:49:45.858000 audit[1618]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.858000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffff518aa0 a2=0 a3=7fffff518a8c items=0 ppid=1576 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:49:45.859000 audit[1620]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.859000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee8c9e040 a2=0 a3=7ffee8c9e02c items=0 ppid=1576 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:49:45.860000 audit[1621]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:45.860000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc80f6d850 a2=0 a3=7ffc80f6d83c items=0 ppid=1576 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:49:45.861000 audit[1622]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:45.861000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd49f94d80 a2=0 a3=7ffd49f94d6c items=0 ppid=1576 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:49:45.961000 audit[1623]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.961000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe409d3f20 a2=0 a3=7ffe409d3f0c items=0 ppid=1576 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:49:45.971000 audit[1625]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.971000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe3faafc90 a2=0 a3=7ffe3faafc7c items=0 ppid=1576 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:49:45.980000 audit[1628]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.980000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff5aaa5900 a2=0 a3=7fff5aaa58ec items=0 ppid=1576 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:49:45.983000 audit[1629]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.983000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff20570e50 a2=0 a3=7fff20570e3c items=0 ppid=1576 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:49:45.989000 audit[1631]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.989000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeaaf6b7d0 a2=0 a3=7ffeaaf6b7bc items=0 ppid=1576 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:49:45.992000 audit[1632]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.992000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd467f7b50 a2=0 a3=7ffd467f7b3c items=0 ppid=1576 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:49:45.999000 audit[1634]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:45.999000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca242f3e0 a2=0 a3=7ffca242f3cc items=0 ppid=1576 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:45.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:49:46.007000 audit[1637]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.007000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcfc58cef0 a2=0 a3=7ffcfc58cedc items=0 ppid=1576 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:49:46.009000 audit[1638]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.009000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4537b8a0 a2=0 a3=7ffc4537b88c items=0 ppid=1576 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:49:46.015000 audit[1640]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.015000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff85b87700 a2=0 a3=7fff85b876ec items=0 ppid=1576 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:49:46.019000 audit[1641]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.019000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbec55300 a2=0 a3=7ffdbec552ec items=0 ppid=1576 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:49:46.026000 audit[1643]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.026000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4eb3c910 a2=0 a3=7fff4eb3c8fc items=0 ppid=1576 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:49:46.035000 audit[1646]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.035000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0b63e5b0 a2=0 a3=7ffe0b63e59c items=0 ppid=1576 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:49:46.046000 audit[1649]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.046000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb625f830 a2=0 a3=7ffeb625f81c items=0 ppid=1576 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:49:46.053000 audit[1650]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.053000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf0503640 a2=0 a3=7ffcf050362c items=0 ppid=1576 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:49:46.059000 audit[1652]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.059000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff4a0b0bc0 a2=0 a3=7fff4a0b0bac items=0 ppid=1576 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:46.125000 audit[1657]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.125000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc9cdda4c0 a2=0 a3=7ffc9cdda4ac items=0 ppid=1576 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:46.129000 audit[1658]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.129000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc396bceb0 a2=0 a3=7ffc396bce9c items=0 ppid=1576 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:49:46.132000 audit[1660]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:46.132000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe2d0dc8e0 a2=0 a3=7ffe2d0dc8cc items=0 ppid=1576 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:49:46.161000 audit[1666]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:46.161000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1bd6eb80 a2=0 a3=7ffc1bd6eb6c items=0 ppid=1576 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:46.223000 audit[1666]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:46.223000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffc1bd6eb80 a2=0 a3=7ffc1bd6eb6c items=0 ppid=1576 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:46.240000 audit[1674]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.240000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee14b4860 a2=0 a3=7ffee14b484c items=0 ppid=1576 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:49:46.243000 audit[1676]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.243000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc526cd6f0 a2=0 a3=7ffc526cd6dc items=0 ppid=1576 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:49:46.247000 audit[1679]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.247000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9c5435b0 a2=0 a3=7ffd9c54359c items=0 ppid=1576 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:49:46.248000 audit[1680]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.248000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff132f9fb0 a2=0 a3=7fff132f9f9c items=0 ppid=1576 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:49:46.251000 audit[1682]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.251000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc61b157d0 a2=0 a3=7ffc61b157bc items=0 ppid=1576 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:49:46.253000 audit[1683]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.253000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc625ddc30 a2=0 a3=7ffc625ddc1c items=0 ppid=1576 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:49:46.258000 audit[1685]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.258000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb183a820 a2=0 a3=7ffcb183a80c items=0 ppid=1576 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:49:46.262000 audit[1688]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.262000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffefdc2ecd0 a2=0 a3=7ffefdc2ecbc items=0 ppid=1576 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:49:46.263000 audit[1689]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.263000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffded88b580 a2=0 a3=7ffded88b56c items=0 ppid=1576 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:49:46.266000 audit[1691]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.266000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd47c16f70 a2=0 a3=7ffd47c16f5c items=0 ppid=1576 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:49:46.267000 audit[1692]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.267000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8ab17e20 a2=0 a3=7ffc8ab17e0c items=0 ppid=1576 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:49:46.271000 audit[1694]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.271000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3fa6a200 a2=0 a3=7ffd3fa6a1ec items=0 ppid=1576 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:49:46.275000 audit[1697]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.275000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe41a93560 a2=0 a3=7ffe41a9354c items=0 ppid=1576 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:49:46.279000 audit[1700]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.279000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde0f2ef10 a2=0 a3=7ffde0f2eefc items=0 ppid=1576 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:49:46.280000 audit[1701]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.280000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe47c2d4d0 a2=0 a3=7ffe47c2d4bc items=0 ppid=1576 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:49:46.283000 audit[1703]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.283000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc7d236e30 a2=0 a3=7ffc7d236e1c items=0 ppid=1576 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:46.287000 audit[1706]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.287000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd4bbbd6a0 a2=0 a3=7ffd4bbbd68c items=0 ppid=1576 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:46.289000 audit[1707]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.289000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc5d06470 a2=0 a3=7ffcc5d0645c items=0 ppid=1576 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:49:46.291000 audit[1709]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.291000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffde2dcfce0 a2=0 a3=7ffde2dcfccc items=0 ppid=1576 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:49:46.293000 audit[1710]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.293000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd424fa50 a2=0 a3=7ffcd424fa3c items=0 ppid=1576 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:49:46.295000 audit[1712]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.295000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbbe35c20 a2=0 a3=7ffdbbe35c0c items=0 ppid=1576 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:46.299000 audit[1715]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:46.299000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff41f2c900 a2=0 a3=7fff41f2c8ec items=0 ppid=1576 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:46.303000 audit[1717]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:49:46.303000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd3444e8a0 a2=0 a3=7ffd3444e88c items=0 ppid=1576 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.303000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:46.303000 audit[1717]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:49:46.303000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd3444e8a0 a2=0 a3=7ffd3444e88c items=0 ppid=1576 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:46.303000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:46.453142 kubelet[1423]: E1213 14:49:46.453029 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:46.720891 kubelet[1423]: I1213 14:49:46.720839 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-5rflg" podStartSLOduration=3.905802546 podStartE2EDuration="6.720715046s" podCreationTimestamp="2024-12-13 14:49:40 +0000 UTC" firstStartedPulling="2024-12-13 14:49:42.819364423 +0000 UTC m=+3.792568088" lastFinishedPulling="2024-12-13 14:49:45.634276913 +0000 UTC m=+6.607480588" observedRunningTime="2024-12-13 14:49:46.720430353 +0000 UTC m=+7.693634068" watchObservedRunningTime="2024-12-13 14:49:46.720715046 +0000 UTC m=+7.693918761" Dec 13 14:49:46.733460 kubelet[1423]: E1213 14:49:46.733413 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.733460 kubelet[1423]: W1213 14:49:46.733457 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.733781 kubelet[1423]: E1213 14:49:46.733496 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.734076 kubelet[1423]: E1213 14:49:46.734041 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.734076 kubelet[1423]: W1213 14:49:46.734072 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.734275 kubelet[1423]: E1213 14:49:46.734104 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.734521 kubelet[1423]: E1213 14:49:46.734489 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.734521 kubelet[1423]: W1213 14:49:46.734519 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.734755 kubelet[1423]: E1213 14:49:46.734548 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.735003 kubelet[1423]: E1213 14:49:46.734971 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.735003 kubelet[1423]: W1213 14:49:46.735001 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.735226 kubelet[1423]: E1213 14:49:46.735031 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.735490 kubelet[1423]: E1213 14:49:46.735458 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.735490 kubelet[1423]: W1213 14:49:46.735488 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.735740 kubelet[1423]: E1213 14:49:46.735517 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.735959 kubelet[1423]: E1213 14:49:46.735927 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.735959 kubelet[1423]: W1213 14:49:46.735956 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.736153 kubelet[1423]: E1213 14:49:46.735985 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.736398 kubelet[1423]: E1213 14:49:46.736368 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.736398 kubelet[1423]: W1213 14:49:46.736397 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.736562 kubelet[1423]: E1213 14:49:46.736426 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.736921 kubelet[1423]: E1213 14:49:46.736867 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.736921 kubelet[1423]: W1213 14:49:46.736919 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.737118 kubelet[1423]: E1213 14:49:46.736949 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.737370 kubelet[1423]: E1213 14:49:46.737338 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.737370 kubelet[1423]: W1213 14:49:46.737367 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.737543 kubelet[1423]: E1213 14:49:46.737397 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.737869 kubelet[1423]: E1213 14:49:46.737837 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.737869 kubelet[1423]: W1213 14:49:46.737868 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.738085 kubelet[1423]: E1213 14:49:46.737897 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.738301 kubelet[1423]: E1213 14:49:46.738270 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.738301 kubelet[1423]: W1213 14:49:46.738298 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.738488 kubelet[1423]: E1213 14:49:46.738329 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.738817 kubelet[1423]: E1213 14:49:46.738784 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.738817 kubelet[1423]: W1213 14:49:46.738818 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.739017 kubelet[1423]: E1213 14:49:46.738847 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.739291 kubelet[1423]: E1213 14:49:46.739258 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.739291 kubelet[1423]: W1213 14:49:46.739288 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.739469 kubelet[1423]: E1213 14:49:46.739318 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.739744 kubelet[1423]: E1213 14:49:46.739713 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.739744 kubelet[1423]: W1213 14:49:46.739741 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.739943 kubelet[1423]: E1213 14:49:46.739772 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.740176 kubelet[1423]: E1213 14:49:46.740145 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.740176 kubelet[1423]: W1213 14:49:46.740174 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.740354 kubelet[1423]: E1213 14:49:46.740202 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.740666 kubelet[1423]: E1213 14:49:46.740584 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.740666 kubelet[1423]: W1213 14:49:46.740649 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.740871 kubelet[1423]: E1213 14:49:46.740680 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.741100 kubelet[1423]: E1213 14:49:46.741067 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.741100 kubelet[1423]: W1213 14:49:46.741096 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.741273 kubelet[1423]: E1213 14:49:46.741124 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.741529 kubelet[1423]: E1213 14:49:46.741498 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.741529 kubelet[1423]: W1213 14:49:46.741527 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.741771 kubelet[1423]: E1213 14:49:46.741557 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.741988 kubelet[1423]: E1213 14:49:46.741956 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.741988 kubelet[1423]: W1213 14:49:46.741986 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.742161 kubelet[1423]: E1213 14:49:46.742041 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.742391 kubelet[1423]: E1213 14:49:46.742361 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.742494 kubelet[1423]: W1213 14:49:46.742390 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.742494 kubelet[1423]: E1213 14:49:46.742447 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.744209 kubelet[1423]: E1213 14:49:46.744053 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.744209 kubelet[1423]: W1213 14:49:46.744086 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.744209 kubelet[1423]: E1213 14:49:46.744127 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.744743 kubelet[1423]: E1213 14:49:46.744703 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.744743 kubelet[1423]: W1213 14:49:46.744739 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.745010 kubelet[1423]: E1213 14:49:46.744777 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.745195 kubelet[1423]: E1213 14:49:46.745163 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.745195 kubelet[1423]: W1213 14:49:46.745193 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.745372 kubelet[1423]: E1213 14:49:46.745231 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.745678 kubelet[1423]: E1213 14:49:46.745642 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.745678 kubelet[1423]: W1213 14:49:46.745674 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.745950 kubelet[1423]: E1213 14:49:46.745915 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.746114 kubelet[1423]: E1213 14:49:46.745976 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.746256 kubelet[1423]: W1213 14:49:46.746228 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.746441 kubelet[1423]: E1213 14:49:46.746416 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.746981 kubelet[1423]: E1213 14:49:46.746940 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.746981 kubelet[1423]: W1213 14:49:46.746976 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.747217 kubelet[1423]: E1213 14:49:46.747020 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.747448 kubelet[1423]: E1213 14:49:46.747401 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.747448 kubelet[1423]: W1213 14:49:46.747435 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.747609 kubelet[1423]: E1213 14:49:46.747473 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.748267 kubelet[1423]: E1213 14:49:46.748229 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.748267 kubelet[1423]: W1213 14:49:46.748265 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.748540 kubelet[1423]: E1213 14:49:46.748508 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.748733 kubelet[1423]: E1213 14:49:46.748686 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.748733 kubelet[1423]: W1213 14:49:46.748725 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.748903 kubelet[1423]: E1213 14:49:46.748755 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.749088 kubelet[1423]: E1213 14:49:46.749053 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.749088 kubelet[1423]: W1213 14:49:46.749082 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.749268 kubelet[1423]: E1213 14:49:46.749110 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.749496 kubelet[1423]: E1213 14:49:46.749464 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.749496 kubelet[1423]: W1213 14:49:46.749493 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.749698 kubelet[1423]: E1213 14:49:46.749521 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:46.750316 kubelet[1423]: E1213 14:49:46.750282 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:46.750316 kubelet[1423]: W1213 14:49:46.750312 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:46.750504 kubelet[1423]: E1213 14:49:46.750342 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.453573 kubelet[1423]: E1213 14:49:47.453530 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:47.481424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1848910301.mount: Deactivated successfully. Dec 13 14:49:47.671293 kubelet[1423]: E1213 14:49:47.671251 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:47.749093 kubelet[1423]: E1213 14:49:47.747967 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.749093 kubelet[1423]: W1213 14:49:47.748003 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.749093 kubelet[1423]: E1213 14:49:47.748041 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.749093 kubelet[1423]: E1213 14:49:47.748355 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.749093 kubelet[1423]: W1213 14:49:47.748374 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.749093 kubelet[1423]: E1213 14:49:47.748403 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.750852 kubelet[1423]: E1213 14:49:47.749785 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.750852 kubelet[1423]: W1213 14:49:47.749812 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.750852 kubelet[1423]: E1213 14:49:47.749843 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.750852 kubelet[1423]: E1213 14:49:47.750163 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.750852 kubelet[1423]: W1213 14:49:47.750182 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.750852 kubelet[1423]: E1213 14:49:47.750209 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.750852 kubelet[1423]: E1213 14:49:47.750523 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.750852 kubelet[1423]: W1213 14:49:47.750542 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.750852 kubelet[1423]: E1213 14:49:47.750568 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.752237 kubelet[1423]: E1213 14:49:47.751685 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.752237 kubelet[1423]: W1213 14:49:47.751713 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.752237 kubelet[1423]: E1213 14:49:47.751741 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.752237 kubelet[1423]: E1213 14:49:47.752053 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.752237 kubelet[1423]: W1213 14:49:47.752075 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.752237 kubelet[1423]: E1213 14:49:47.752103 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.753137 kubelet[1423]: E1213 14:49:47.752868 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.753137 kubelet[1423]: W1213 14:49:47.752889 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.753137 kubelet[1423]: E1213 14:49:47.752917 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.753588 kubelet[1423]: E1213 14:49:47.753561 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.753957 kubelet[1423]: W1213 14:49:47.753778 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.753957 kubelet[1423]: E1213 14:49:47.753820 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.754354 kubelet[1423]: E1213 14:49:47.754328 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.754677 kubelet[1423]: W1213 14:49:47.754493 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.754677 kubelet[1423]: E1213 14:49:47.754535 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.755163 kubelet[1423]: E1213 14:49:47.755138 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.755326 kubelet[1423]: W1213 14:49:47.755300 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.755482 kubelet[1423]: E1213 14:49:47.755460 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.755985 kubelet[1423]: E1213 14:49:47.755959 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.756157 kubelet[1423]: W1213 14:49:47.756131 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.756304 kubelet[1423]: E1213 14:49:47.756283 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.756845 kubelet[1423]: E1213 14:49:47.756819 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.757051 kubelet[1423]: W1213 14:49:47.757024 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.757201 kubelet[1423]: E1213 14:49:47.757180 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.757694 kubelet[1423]: E1213 14:49:47.757610 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.757874 kubelet[1423]: W1213 14:49:47.757847 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.758023 kubelet[1423]: E1213 14:49:47.758002 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.758454 kubelet[1423]: E1213 14:49:47.758429 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.758606 kubelet[1423]: W1213 14:49:47.758581 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.758818 kubelet[1423]: E1213 14:49:47.758796 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.759291 kubelet[1423]: E1213 14:49:47.759266 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.759444 kubelet[1423]: W1213 14:49:47.759419 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.759596 kubelet[1423]: E1213 14:49:47.759575 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.760185 kubelet[1423]: E1213 14:49:47.760159 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.760349 kubelet[1423]: W1213 14:49:47.760323 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.760493 kubelet[1423]: E1213 14:49:47.760473 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.760991 kubelet[1423]: E1213 14:49:47.760965 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.761164 kubelet[1423]: W1213 14:49:47.761138 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.761310 kubelet[1423]: E1213 14:49:47.761290 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.761817 kubelet[1423]: E1213 14:49:47.761791 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.761971 kubelet[1423]: W1213 14:49:47.761947 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.762166 kubelet[1423]: E1213 14:49:47.762140 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.762663 kubelet[1423]: E1213 14:49:47.762579 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.763518 kubelet[1423]: W1213 14:49:47.762782 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.763518 kubelet[1423]: E1213 14:49:47.762820 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.763805 kubelet[1423]: E1213 14:49:47.763778 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.763949 kubelet[1423]: W1213 14:49:47.763924 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.764106 kubelet[1423]: E1213 14:49:47.764084 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.764551 kubelet[1423]: E1213 14:49:47.764532 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.764716 kubelet[1423]: W1213 14:49:47.764695 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.764852 kubelet[1423]: E1213 14:49:47.764834 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.765285 kubelet[1423]: E1213 14:49:47.765226 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.765285 kubelet[1423]: W1213 14:49:47.765274 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.765433 kubelet[1423]: E1213 14:49:47.765329 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.765839 kubelet[1423]: E1213 14:49:47.765806 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.765839 kubelet[1423]: W1213 14:49:47.765837 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.765992 kubelet[1423]: E1213 14:49:47.765879 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.766373 kubelet[1423]: E1213 14:49:47.766263 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.766373 kubelet[1423]: W1213 14:49:47.766361 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.766503 kubelet[1423]: E1213 14:49:47.766487 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.766797 kubelet[1423]: E1213 14:49:47.766770 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.766842 kubelet[1423]: W1213 14:49:47.766800 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.766870 kubelet[1423]: E1213 14:49:47.766839 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.767306 kubelet[1423]: E1213 14:49:47.767278 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.767361 kubelet[1423]: W1213 14:49:47.767309 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.767361 kubelet[1423]: E1213 14:49:47.767350 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.767728 kubelet[1423]: E1213 14:49:47.767702 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.767772 kubelet[1423]: W1213 14:49:47.767730 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.767772 kubelet[1423]: E1213 14:49:47.767768 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.768438 kubelet[1423]: E1213 14:49:47.768397 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.768438 kubelet[1423]: W1213 14:49:47.768434 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.768553 kubelet[1423]: E1213 14:49:47.768538 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.769131 kubelet[1423]: E1213 14:49:47.769094 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.769189 kubelet[1423]: W1213 14:49:47.769130 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.769222 kubelet[1423]: E1213 14:49:47.769193 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.769713 kubelet[1423]: E1213 14:49:47.769683 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.769758 kubelet[1423]: W1213 14:49:47.769716 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.769915 kubelet[1423]: E1213 14:49:47.769879 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.770584 kubelet[1423]: E1213 14:49:47.770545 1423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:47.770669 kubelet[1423]: W1213 14:49:47.770604 1423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:47.770705 kubelet[1423]: E1213 14:49:47.770688 1423 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:47.777556 env[1136]: time="2024-12-13T14:49:47.776847371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:47.779847 env[1136]: time="2024-12-13T14:49:47.779222094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:47.781990 env[1136]: time="2024-12-13T14:49:47.781286157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:47.783403 env[1136]: time="2024-12-13T14:49:47.783347526Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:47.784040 env[1136]: time="2024-12-13T14:49:47.784009322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:49:47.787671 env[1136]: time="2024-12-13T14:49:47.787570289Z" level=info msg="CreateContainer within sandbox \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:49:47.810473 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4214880554.mount: Deactivated successfully. Dec 13 14:49:47.816341 env[1136]: time="2024-12-13T14:49:47.816301775Z" level=info msg="CreateContainer within sandbox \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9\"" Dec 13 14:49:47.817812 env[1136]: time="2024-12-13T14:49:47.817743588Z" level=info msg="StartContainer for \"146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9\"" Dec 13 14:49:47.846275 systemd[1]: Started cri-containerd-146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9.scope. Dec 13 14:49:47.867000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.867000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5ace556948 items=0 ppid=1487 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:47.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363433346364333237626531323930383732346330643939303562 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.868000 audit: BPF prog-id=72 op=LOAD Dec 13 14:49:47.868000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bc398 items=0 ppid=1487 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:47.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363433346364333237626531323930383732346330643939303562 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit: BPF prog-id=73 op=LOAD Dec 13 14:49:47.869000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003bc3e8 items=0 ppid=1487 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363433346364333237626531323930383732346330643939303562 Dec 13 14:49:47.869000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:49:47.869000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:47.869000 audit: BPF prog-id=74 op=LOAD Dec 13 14:49:47.869000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003bc478 items=0 ppid=1487 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:47.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134363433346364333237626531323930383732346330643939303562 Dec 13 14:49:47.892884 env[1136]: time="2024-12-13T14:49:47.892788734Z" level=info msg="StartContainer for \"146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9\" returns successfully" Dec 13 14:49:47.902974 systemd[1]: cri-containerd-146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9.scope: Deactivated successfully. Dec 13 14:49:47.906000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:49:48.366408 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9-rootfs.mount: Deactivated successfully. Dec 13 14:49:48.455369 kubelet[1423]: E1213 14:49:48.455295 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:48.528025 env[1136]: time="2024-12-13T14:49:48.527926488Z" level=info msg="shim disconnected" id=146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9 Dec 13 14:49:48.528313 env[1136]: time="2024-12-13T14:49:48.528268455Z" level=warning msg="cleaning up after shim disconnected" id=146434cd327be12908724c0d9905bc4fb2e4d03f41b2ff66dd14dc50e8d01ab9 namespace=k8s.io Dec 13 14:49:48.528470 env[1136]: time="2024-12-13T14:49:48.528434916Z" level=info msg="cleaning up dead shim" Dec 13 14:49:48.547215 env[1136]: time="2024-12-13T14:49:48.547102402Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:49:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1828 runtime=io.containerd.runc.v2\n" Dec 13 14:49:48.712709 env[1136]: time="2024-12-13T14:49:48.712424558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:49:49.456572 kubelet[1423]: E1213 14:49:49.456454 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:49.672779 kubelet[1423]: E1213 14:49:49.672035 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:49.771873 update_engine[1130]: I1213 14:49:49.771226 1130 update_attempter.cc:509] Updating boot flags... Dec 13 14:49:50.457774 kubelet[1423]: E1213 14:49:50.457699 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:51.458069 kubelet[1423]: E1213 14:49:51.457985 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:51.672017 kubelet[1423]: E1213 14:49:51.671959 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:52.458608 kubelet[1423]: E1213 14:49:52.458541 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:53.459010 kubelet[1423]: E1213 14:49:53.458944 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:53.671765 kubelet[1423]: E1213 14:49:53.671598 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:54.459742 kubelet[1423]: E1213 14:49:54.459674 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:55.460096 kubelet[1423]: E1213 14:49:55.459962 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:55.672641 kubelet[1423]: E1213 14:49:55.671724 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:56.460379 kubelet[1423]: E1213 14:49:56.460262 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:57.196090 env[1136]: time="2024-12-13T14:49:57.195906719Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:57.199342 env[1136]: time="2024-12-13T14:49:57.199039732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:57.201540 env[1136]: time="2024-12-13T14:49:57.201494445Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:57.204432 env[1136]: time="2024-12-13T14:49:57.204411507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:57.205959 env[1136]: time="2024-12-13T14:49:57.205887918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:49:57.209291 env[1136]: time="2024-12-13T14:49:57.209223200Z" level=info msg="CreateContainer within sandbox \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:49:57.231846 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2289286570.mount: Deactivated successfully. Dec 13 14:49:57.243943 env[1136]: time="2024-12-13T14:49:57.243899030Z" level=info msg="CreateContainer within sandbox \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c\"" Dec 13 14:49:57.244791 env[1136]: time="2024-12-13T14:49:57.244766215Z" level=info msg="StartContainer for \"184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c\"" Dec 13 14:49:57.291649 systemd[1]: run-containerd-runc-k8s.io-184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c-runc.4KHY5c.mount: Deactivated successfully. Dec 13 14:49:57.296128 systemd[1]: Started cri-containerd-184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c.scope. Dec 13 14:49:57.319351 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:49:57.319473 kernel: audit: type=1400 audit(1734101397.312:436): avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f89c0219dc8 items=0 ppid=1487 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.325635 kernel: audit: type=1300 audit(1734101397.312:436): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f89c0219dc8 items=0 ppid=1487 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346539326137356437393866386134643063376132393963396566 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.334404 kernel: audit: type=1327 audit(1734101397.312:436): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346539326137356437393866386134643063376132393963396566 Dec 13 14:49:57.334466 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.334490 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.344502 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.344692 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.352578 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.352647 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.356628 kernel: audit: type=1400 audit(1734101397.312:437): avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit: BPF prog-id=75 op=LOAD Dec 13 14:49:57.312000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00037e368 items=0 ppid=1487 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346539326137356437393866386134643063376132393963396566 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit: BPF prog-id=76 op=LOAD Dec 13 14:49:57.312000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00037e3b8 items=0 ppid=1487 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346539326137356437393866386134643063376132393963396566 Dec 13 14:49:57.312000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:49:57.312000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.312000 audit: BPF prog-id=77 op=LOAD Dec 13 14:49:57.312000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00037e448 items=0 ppid=1487 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346539326137356437393866386134643063376132393963396566 Dec 13 14:49:57.361376 env[1136]: time="2024-12-13T14:49:57.361334094Z" level=info msg="StartContainer for \"184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c\" returns successfully" Dec 13 14:49:57.460829 kubelet[1423]: E1213 14:49:57.460645 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:57.671759 kubelet[1423]: E1213 14:49:57.671664 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:49:58.461370 kubelet[1423]: E1213 14:49:58.461221 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:59.080412 env[1136]: time="2024-12-13T14:49:59.080277766Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:49:59.085986 systemd[1]: cri-containerd-184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c.scope: Deactivated successfully. Dec 13 14:49:59.090000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:49:59.136242 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c-rootfs.mount: Deactivated successfully. Dec 13 14:49:59.145182 kubelet[1423]: I1213 14:49:59.144932 1423 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:49:59.462602 kubelet[1423]: E1213 14:49:59.462362 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:49:59.682320 systemd[1]: Created slice kubepods-besteffort-pod288add20_1b47_41cd_995d_fca300f12b3c.slice. Dec 13 14:49:59.688066 env[1136]: time="2024-12-13T14:49:59.687980746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6gz2f,Uid:288add20-1b47-41cd-995d-fca300f12b3c,Namespace:calico-system,Attempt:0,}" Dec 13 14:49:59.940373 env[1136]: time="2024-12-13T14:49:59.940322563Z" level=info msg="shim disconnected" id=184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c Dec 13 14:49:59.940561 env[1136]: time="2024-12-13T14:49:59.940540171Z" level=warning msg="cleaning up after shim disconnected" id=184e92a75d798f8a4d0c7a299c9efa63708b68ac3c43b792b226208d9c5d074c namespace=k8s.io Dec 13 14:49:59.940651 env[1136]: time="2024-12-13T14:49:59.940634189Z" level=info msg="cleaning up dead shim" Dec 13 14:49:59.950125 env[1136]: time="2024-12-13T14:49:59.950040452Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:49:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1906 runtime=io.containerd.runc.v2\n" Dec 13 14:50:00.052105 env[1136]: time="2024-12-13T14:50:00.051969924Z" level=error msg="Failed to destroy network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:00.056856 env[1136]: time="2024-12-13T14:50:00.053940066Z" level=error msg="encountered an error cleaning up failed sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:00.056856 env[1136]: time="2024-12-13T14:50:00.054040816Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6gz2f,Uid:288add20-1b47-41cd-995d-fca300f12b3c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:00.057395 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a-shm.mount: Deactivated successfully. Dec 13 14:50:00.058581 kubelet[1423]: E1213 14:50:00.057816 1423 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:00.058581 kubelet[1423]: E1213 14:50:00.057899 1423 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:50:00.058581 kubelet[1423]: E1213 14:50:00.057925 1423 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6gz2f" Dec 13 14:50:00.058724 kubelet[1423]: E1213 14:50:00.057986 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6gz2f_calico-system(288add20-1b47-41cd-995d-fca300f12b3c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6gz2f_calico-system(288add20-1b47-41cd-995d-fca300f12b3c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:50:00.446308 kubelet[1423]: E1213 14:50:00.446251 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:00.464206 kubelet[1423]: E1213 14:50:00.464098 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:00.752200 env[1136]: time="2024-12-13T14:50:00.751969563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:50:00.755721 kubelet[1423]: I1213 14:50:00.755669 1423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:00.758699 env[1136]: time="2024-12-13T14:50:00.756966317Z" level=info msg="StopPodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\"" Dec 13 14:50:00.832389 env[1136]: time="2024-12-13T14:50:00.832276229Z" level=error msg="StopPodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" failed" error="failed to destroy network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:00.833462 kubelet[1423]: E1213 14:50:00.833355 1423 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:00.833679 kubelet[1423]: E1213 14:50:00.833532 1423 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a"} Dec 13 14:50:00.833679 kubelet[1423]: E1213 14:50:00.833679 1423 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"288add20-1b47-41cd-995d-fca300f12b3c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:50:00.833948 kubelet[1423]: E1213 14:50:00.833760 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"288add20-1b47-41cd-995d-fca300f12b3c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6gz2f" podUID="288add20-1b47-41cd-995d-fca300f12b3c" Dec 13 14:50:01.465223 kubelet[1423]: E1213 14:50:01.465081 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:02.177392 kubelet[1423]: I1213 14:50:02.177278 1423 topology_manager.go:215] "Topology Admit Handler" podUID="e1881654-52ac-447a-a447-e45b4e7d921a" podNamespace="default" podName="nginx-deployment-6d5f899847-t7fls" Dec 13 14:50:02.194379 systemd[1]: Created slice kubepods-besteffort-pode1881654_52ac_447a_a447_e45b4e7d921a.slice. Dec 13 14:50:02.365666 kubelet[1423]: I1213 14:50:02.365540 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w9h97\" (UniqueName: \"kubernetes.io/projected/e1881654-52ac-447a-a447-e45b4e7d921a-kube-api-access-w9h97\") pod \"nginx-deployment-6d5f899847-t7fls\" (UID: \"e1881654-52ac-447a-a447-e45b4e7d921a\") " pod="default/nginx-deployment-6d5f899847-t7fls" Dec 13 14:50:02.466349 kubelet[1423]: E1213 14:50:02.466122 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:02.501348 env[1136]: time="2024-12-13T14:50:02.501236656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t7fls,Uid:e1881654-52ac-447a-a447-e45b4e7d921a,Namespace:default,Attempt:0,}" Dec 13 14:50:02.649604 env[1136]: time="2024-12-13T14:50:02.649522950Z" level=error msg="Failed to destroy network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:02.651419 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098-shm.mount: Deactivated successfully. Dec 13 14:50:02.652449 env[1136]: time="2024-12-13T14:50:02.652413949Z" level=error msg="encountered an error cleaning up failed sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:02.652534 env[1136]: time="2024-12-13T14:50:02.652478646Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t7fls,Uid:e1881654-52ac-447a-a447-e45b4e7d921a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:02.653259 kubelet[1423]: E1213 14:50:02.652829 1423 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:02.653259 kubelet[1423]: E1213 14:50:02.652892 1423 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-t7fls" Dec 13 14:50:02.653259 kubelet[1423]: E1213 14:50:02.652921 1423 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-t7fls" Dec 13 14:50:02.653430 kubelet[1423]: E1213 14:50:02.652987 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-t7fls_default(e1881654-52ac-447a-a447-e45b4e7d921a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-t7fls_default(e1881654-52ac-447a-a447-e45b4e7d921a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-t7fls" podUID="e1881654-52ac-447a-a447-e45b4e7d921a" Dec 13 14:50:02.763837 kubelet[1423]: I1213 14:50:02.763112 1423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:02.765290 env[1136]: time="2024-12-13T14:50:02.765221352Z" level=info msg="StopPodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\"" Dec 13 14:50:02.848461 env[1136]: time="2024-12-13T14:50:02.848396798Z" level=error msg="StopPodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" failed" error="failed to destroy network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:02.849121 kubelet[1423]: E1213 14:50:02.848942 1423 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:02.849121 kubelet[1423]: E1213 14:50:02.848997 1423 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098"} Dec 13 14:50:02.849121 kubelet[1423]: E1213 14:50:02.849059 1423 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1881654-52ac-447a-a447-e45b4e7d921a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:50:02.849121 kubelet[1423]: E1213 14:50:02.849098 1423 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1881654-52ac-447a-a447-e45b4e7d921a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-t7fls" podUID="e1881654-52ac-447a-a447-e45b4e7d921a" Dec 13 14:50:03.468757 kubelet[1423]: E1213 14:50:03.468697 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:04.469287 kubelet[1423]: E1213 14:50:04.469223 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:05.469918 kubelet[1423]: E1213 14:50:05.469826 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:06.470533 kubelet[1423]: E1213 14:50:06.470459 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:07.470637 kubelet[1423]: E1213 14:50:07.470565 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:08.471048 kubelet[1423]: E1213 14:50:08.470983 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:09.472263 kubelet[1423]: E1213 14:50:09.472135 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:10.472823 kubelet[1423]: E1213 14:50:10.472691 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:11.473852 kubelet[1423]: E1213 14:50:11.473713 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:12.164407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount481296753.mount: Deactivated successfully. Dec 13 14:50:12.215372 env[1136]: time="2024-12-13T14:50:12.215209260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:12.219019 env[1136]: time="2024-12-13T14:50:12.218947216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:12.232333 env[1136]: time="2024-12-13T14:50:12.232234286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:12.234324 env[1136]: time="2024-12-13T14:50:12.234262044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:12.236877 env[1136]: time="2024-12-13T14:50:12.236803410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:50:12.281013 env[1136]: time="2024-12-13T14:50:12.280916042Z" level=info msg="CreateContainer within sandbox \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:50:12.310209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1399746059.mount: Deactivated successfully. Dec 13 14:50:12.312483 env[1136]: time="2024-12-13T14:50:12.312440798Z" level=info msg="CreateContainer within sandbox \"20b74168708e3764b80eaf421780fa70f9a83261bbcbbff36d8768ccf290375c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"81f08413e2f81e3480010413cc4cd8ac03a5012bb391bd6f2bef8d1035067039\"" Dec 13 14:50:12.313525 env[1136]: time="2024-12-13T14:50:12.313480926Z" level=info msg="StartContainer for \"81f08413e2f81e3480010413cc4cd8ac03a5012bb391bd6f2bef8d1035067039\"" Dec 13 14:50:12.332704 systemd[1]: Started cri-containerd-81f08413e2f81e3480010413cc4cd8ac03a5012bb391bd6f2bef8d1035067039.scope. Dec 13 14:50:12.358813 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:50:12.359452 kernel: audit: type=1400 audit(1734101412.352:443): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd539ccc3b8 items=0 ppid=1487 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:12.365759 kernel: audit: type=1300 audit(1734101412.352:443): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd539ccc3b8 items=0 ppid=1487 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663038343133653266383165333438303031303431336363346364 Dec 13 14:50:12.371680 kernel: audit: type=1327 audit(1734101412.352:443): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663038343133653266383165333438303031303431336363346364 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.375684 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.386652 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.386773 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.391760 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.395684 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.408999 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.411252 kernel: audit: type=1400 audit(1734101412.352:444): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.352000 audit: BPF prog-id=78 op=LOAD Dec 13 14:50:12.352000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000244a48 items=0 ppid=1487 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663038343133653266383165333438303031303431336363346364 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit: BPF prog-id=79 op=LOAD Dec 13 14:50:12.357000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000244a98 items=0 ppid=1487 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:12.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663038343133653266383165333438303031303431336363346364 Dec 13 14:50:12.357000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:50:12.357000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:12.357000 audit: BPF prog-id=80 op=LOAD Dec 13 14:50:12.357000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000244b28 items=0 ppid=1487 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:12.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831663038343133653266383165333438303031303431336363346364 Dec 13 14:50:12.413223 env[1136]: time="2024-12-13T14:50:12.413168410Z" level=info msg="StartContainer for \"81f08413e2f81e3480010413cc4cd8ac03a5012bb391bd6f2bef8d1035067039\" returns successfully" Dec 13 14:50:12.475159 kubelet[1423]: E1213 14:50:12.474962 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:12.500536 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:50:12.500888 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:50:13.476227 kubelet[1423]: E1213 14:50:13.476136 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:14.152000 audit[2178]: AVC avc: denied { write } for pid=2178 comm="tee" name="fd" dev="proc" ino=19546 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.152000 audit[2178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfe7f7a0a a2=241 a3=1b6 items=1 ppid=2148 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.152000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:50:14.152000 audit: PATH item=0 name="/dev/fd/63" inode=19531 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.156000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=19550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.156000 audit[2185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe060aa0a a2=241 a3=1b6 items=1 ppid=2154 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.156000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:50:14.156000 audit: PATH item=0 name="/dev/fd/63" inode=19073 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.159000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=19556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.159000 audit[2188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff500809fb a2=241 a3=1b6 items=1 ppid=2155 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.159000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:50:14.159000 audit: PATH item=0 name="/dev/fd/63" inode=19543 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.159000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.161000 audit[2181]: AVC avc: denied { write } for pid=2181 comm="tee" name="fd" dev="proc" ino=19081 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.161000 audit[2181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfaf73a0b a2=241 a3=1b6 items=1 ppid=2149 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.161000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:50:14.161000 audit: PATH item=0 name="/dev/fd/63" inode=19534 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.169000 audit[2204]: AVC avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=19562 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.169000 audit[2204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc92712a0a a2=241 a3=1b6 items=1 ppid=2157 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.169000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:50:14.169000 audit: PATH item=0 name="/dev/fd/63" inode=19552 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.170000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=19566 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.170000 audit[2206]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25c9aa0c a2=241 a3=1b6 items=1 ppid=2162 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.170000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:50:14.170000 audit: PATH item=0 name="/dev/fd/63" inode=19553 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.171000 audit[2208]: AVC avc: denied { write } for pid=2208 comm="tee" name="fd" dev="proc" ino=19088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:14.171000 audit[2208]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2a2979fa a2=241 a3=1b6 items=1 ppid=2152 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.171000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:50:14.171000 audit: PATH item=0 name="/dev/fd/63" inode=19078 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:14.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.469000 audit: BPF prog-id=81 op=LOAD Dec 13 14:50:14.469000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd08a20d10 a2=98 a3=3 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.471000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.471000 audit: BPF prog-id=82 op=LOAD Dec 13 14:50:14.478448 kubelet[1423]: E1213 14:50:14.478137 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:14.471000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd08a20af0 a2=74 a3=540051 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.478000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.478000 audit: BPF prog-id=83 op=LOAD Dec 13 14:50:14.478000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd08a20b20 a2=94 a3=2 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.478000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.481000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.642000 audit: BPF prog-id=84 op=LOAD Dec 13 14:50:14.642000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd08a209e0 a2=40 a3=1 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.642000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.643000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:50:14.643000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.643000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd08a20ab0 a2=50 a3=7ffd08a20b90 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.653000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.653000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08a209f0 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.653000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.653000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08a20a20 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.653000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.653000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08a20930 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.654000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.654000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08a20a40 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.654000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.654000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08a20a20 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.654000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.654000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08a20a10 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.654000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.654000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08a20a40 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.654000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.654000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08a20a20 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.654000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.655000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.655000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08a20a40 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.655000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.655000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08a20a10 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.655000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.655000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08a20a80 a2=28 a3=0 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.655000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.655000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd08a20830 a2=50 a3=1 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.655000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.656000 audit: BPF prog-id=85 op=LOAD Dec 13 14:50:14.656000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd08a20830 a2=94 a3=5 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.656000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.656000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd08a208e0 a2=50 a3=1 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.657000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd08a20a00 a2=4 a3=38 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.657000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.657000 audit[2243]: AVC avc: denied { confidentiality } for pid=2243 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:14.657000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd08a20a50 a2=94 a3=6 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.657000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.658000 audit[2243]: AVC avc: denied { confidentiality } for pid=2243 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:14.658000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd08a20200 a2=94 a3=83 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.658000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.659000 audit[2243]: AVC avc: denied { confidentiality } for pid=2243 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:14.659000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd08a20200 a2=94 a3=83 items=0 ppid=2150 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.659000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:14.674061 env[1136]: time="2024-12-13T14:50:14.673699694Z" level=info msg="StopPodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\"" Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.676000 audit: BPF prog-id=86 op=LOAD Dec 13 14:50:14.676000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd796d35d0 a2=98 a3=1999999999999999 items=0 ppid=2150 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.676000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:50:14.680000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit: BPF prog-id=87 op=LOAD Dec 13 14:50:14.680000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd796d34b0 a2=74 a3=ffff items=0 ppid=2150 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.680000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:50:14.680000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.680000 audit: BPF prog-id=88 op=LOAD Dec 13 14:50:14.680000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd796d34f0 a2=40 a3=7ffd796d36d0 items=0 ppid=2150 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.680000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:50:14.680000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:50:14.777178 systemd-networkd[968]: vxlan.calico: Link UP Dec 13 14:50:14.777195 systemd-networkd[968]: vxlan.calico: Gained carrier Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit: BPF prog-id=89 op=LOAD Dec 13 14:50:14.819000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5896f9b0 a2=98 a3=100 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.819000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.819000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit: BPF prog-id=90 op=LOAD Dec 13 14:50:14.819000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5896f7c0 a2=74 a3=540051 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.819000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.819000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.819000 audit: BPF prog-id=91 op=LOAD Dec 13 14:50:14.819000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5896f7f0 a2=94 a3=2 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.819000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5896f6c0 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5896f6f0 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5896f600 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5896f710 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5896f6f0 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5896f6e0 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5896f710 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5896f6f0 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5896f710 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5896f6e0 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5896f750 a2=28 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit: BPF prog-id=92 op=LOAD Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5896f5c0 a2=40 a3=0 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd5896f5b0 a2=50 a3=2800 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd5896f5b0 a2=50 a3=2800 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.820000 audit: BPF prog-id=93 op=LOAD Dec 13 14:50:14.820000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5896edd0 a2=94 a3=2 items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.821000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.821000 audit: BPF prog-id=94 op=LOAD Dec 13 14:50:14.821000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5896eed0 a2=94 a3=2d items=0 ppid=2150 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.829000 audit: BPF prog-id=95 op=LOAD Dec 13 14:50:14.829000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1c5a8af0 a2=98 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.829000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit: BPF prog-id=96 op=LOAD Dec 13 14:50:14.830000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1c5a88d0 a2=74 a3=540051 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.830000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.830000 audit: BPF prog-id=97 op=LOAD Dec 13 14:50:14.830000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1c5a8900 a2=94 a3=2 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.830000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:50:14.877201 kubelet[1423]: I1213 14:50:14.877157 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-rkhdg" podStartSLOduration=5.469054545 podStartE2EDuration="34.877089406s" podCreationTimestamp="2024-12-13 14:49:40 +0000 UTC" firstStartedPulling="2024-12-13 14:49:42.829180597 +0000 UTC m=+3.802384262" lastFinishedPulling="2024-12-13 14:50:12.237215408 +0000 UTC m=+33.210419123" observedRunningTime="2024-12-13 14:50:12.894056277 +0000 UTC m=+33.867260002" watchObservedRunningTime="2024-12-13 14:50:14.877089406 +0000 UTC m=+35.850293071" Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.974000 audit: BPF prog-id=98 op=LOAD Dec 13 14:50:14.974000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1c5a87c0 a2=40 a3=1 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.976000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:50:14.976000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.976000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe1c5a8890 a2=50 a3=7ffe1c5a8970 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.976000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.986000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.986000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1c5a87d0 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.987000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.987000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1c5a8800 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.987000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.987000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1c5a8710 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.987000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.987000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1c5a8820 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1c5a8800 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1c5a87f0 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1c5a8820 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1c5a8800 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1c5a8820 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1c5a87f0 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1c5a8860 a2=28 a3=0 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1c5a8610 a2=50 a3=1 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.988000 audit: BPF prog-id=99 op=LOAD Dec 13 14:50:14.988000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1c5a8610 a2=94 a3=5 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.989000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1c5a86c0 a2=50 a3=1 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe1c5a87e0 a2=4 a3=38 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.989000 audit[2314]: AVC avc: denied { confidentiality } for pid=2314 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:14.989000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1c5a8830 a2=94 a3=6 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.992000 audit[2314]: AVC avc: denied { confidentiality } for pid=2314 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:14.992000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1c5a7fe0 a2=94 a3=83 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.992000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.993000 audit[2314]: AVC avc: denied { confidentiality } for pid=2314 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:14.993000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1c5a7fe0 a2=94 a3=83 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.994000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.994000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1c5a9a20 a2=10 a3=f0f1 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.994000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.994000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1c5a98c0 a2=10 a3=3 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.994000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.994000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1c5a9860 a2=10 a3=3 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:14.994000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.994000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1c5a9860 a2=10 a3=7 items=0 ppid=2150 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:15.002000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.877 [INFO][2287] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.879 [INFO][2287] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" iface="eth0" netns="/var/run/netns/cni-4359771a-06a1-224d-2c12-58bf4291d9ed" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.880 [INFO][2287] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" iface="eth0" netns="/var/run/netns/cni-4359771a-06a1-224d-2c12-58bf4291d9ed" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.883 [INFO][2287] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" iface="eth0" netns="/var/run/netns/cni-4359771a-06a1-224d-2c12-58bf4291d9ed" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.883 [INFO][2287] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.883 [INFO][2287] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.979 [INFO][2317] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.979 [INFO][2317] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.979 [INFO][2317] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.999 [WARNING][2317] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:14.999 [INFO][2317] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:15.005 [INFO][2317] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:15.010062 env[1136]: 2024-12-13 14:50:15.007 [INFO][2287] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:15.010786 env[1136]: time="2024-12-13T14:50:15.010745829Z" level=info msg="TearDown network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" successfully" Dec 13 14:50:15.010877 env[1136]: time="2024-12-13T14:50:15.010857468Z" level=info msg="StopPodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" returns successfully" Dec 13 14:50:15.012285 systemd[1]: run-netns-cni\x2d4359771a\x2d06a1\x2d224d\x2d2c12\x2d58bf4291d9ed.mount: Deactivated successfully. Dec 13 14:50:15.016707 env[1136]: time="2024-12-13T14:50:15.016122985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t7fls,Uid:e1881654-52ac-447a-a447-e45b4e7d921a,Namespace:default,Attempt:1,}" Dec 13 14:50:15.101000 audit[2355]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:15.101000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffecacfd0b0 a2=0 a3=7ffecacfd09c items=0 ppid=2150 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.101000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:15.118000 audit[2354]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:15.118000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd1dfe4af0 a2=0 a3=7ffd1dfe4adc items=0 ppid=2150 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:15.124000 audit[2356]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:15.124000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc3f12e840 a2=0 a3=7ffc3f12e82c items=0 ppid=2150 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.124000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:15.125000 audit[2361]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:15.125000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcd2a638b0 a2=0 a3=7ffcd2a6389c items=0 ppid=2150 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.125000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:15.285108 systemd-networkd[968]: cali887f5c8250f: Link UP Dec 13 14:50:15.292854 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali887f5c8250f: link becomes ready Dec 13 14:50:15.290436 systemd-networkd[968]: cali887f5c8250f: Gained carrier Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.135 [INFO][2335] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0 nginx-deployment-6d5f899847- default e1881654-52ac-447a-a447-e45b4e7d921a 1128 0 2024-12-13 14:50:02 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.107 nginx-deployment-6d5f899847-t7fls eth0 default [] [] [kns.default ksa.default.default] cali887f5c8250f [] []}} ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.135 [INFO][2335] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.190 [INFO][2367] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" HandleID="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.212 [INFO][2367] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" HandleID="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000404020), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.107", "pod":"nginx-deployment-6d5f899847-t7fls", "timestamp":"2024-12-13 14:50:15.190504006 +0000 UTC"}, Hostname:"172.24.4.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.212 [INFO][2367] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.212 [INFO][2367] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.212 [INFO][2367] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.107' Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.216 [INFO][2367] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.227 [INFO][2367] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.234 [INFO][2367] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.238 [INFO][2367] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.242 [INFO][2367] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.242 [INFO][2367] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.246 [INFO][2367] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.255 [INFO][2367] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.268 [INFO][2367] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.65/26] block=192.168.97.64/26 handle="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.268 [INFO][2367] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.65/26] handle="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" host="172.24.4.107" Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.268 [INFO][2367] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:15.327322 env[1136]: 2024-12-13 14:50:15.268 [INFO][2367] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.65/26] IPv6=[] ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" HandleID="k8s-pod-network.66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.329003 env[1136]: 2024-12-13 14:50:15.272 [INFO][2335] cni-plugin/k8s.go 386: Populated endpoint ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e1881654-52ac-447a-a447-e45b4e7d921a", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"", Pod:"nginx-deployment-6d5f899847-t7fls", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali887f5c8250f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:15.329003 env[1136]: 2024-12-13 14:50:15.273 [INFO][2335] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.65/32] ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.329003 env[1136]: 2024-12-13 14:50:15.273 [INFO][2335] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali887f5c8250f ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.329003 env[1136]: 2024-12-13 14:50:15.301 [INFO][2335] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.329003 env[1136]: 2024-12-13 14:50:15.302 [INFO][2335] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e1881654-52ac-447a-a447-e45b4e7d921a", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed", Pod:"nginx-deployment-6d5f899847-t7fls", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali887f5c8250f", MAC:"7a:51:ce:b1:fb:62", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:15.329003 env[1136]: 2024-12-13 14:50:15.315 [INFO][2335] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed" Namespace="default" Pod="nginx-deployment-6d5f899847-t7fls" WorkloadEndpoint="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:15.348000 audit[2392]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:15.348000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7fff7c4cc240 a2=0 a3=7fff7c4cc22c items=0 ppid=2150 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.348000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:15.360827 env[1136]: time="2024-12-13T14:50:15.360271805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:15.360827 env[1136]: time="2024-12-13T14:50:15.360376841Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:15.360827 env[1136]: time="2024-12-13T14:50:15.360408971Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:15.363711 env[1136]: time="2024-12-13T14:50:15.363527635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed pid=2396 runtime=io.containerd.runc.v2 Dec 13 14:50:15.396341 systemd[1]: Started cri-containerd-66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed.scope. Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.405000 audit: BPF prog-id=100 op=LOAD Dec 13 14:50:15.406000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.406000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2396 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613963393238363030383532333037383566663364303234373031 Dec 13 14:50:15.406000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.406000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2396 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613963393238363030383532333037383566663364303234373031 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit: BPF prog-id=101 op=LOAD Dec 13 14:50:15.407000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001a0350 items=0 ppid=2396 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613963393238363030383532333037383566663364303234373031 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.407000 audit: BPF prog-id=102 op=LOAD Dec 13 14:50:15.407000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001a0398 items=0 ppid=2396 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613963393238363030383532333037383566663364303234373031 Dec 13 14:50:15.408000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:50:15.408000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:15.408000 audit: BPF prog-id=103 op=LOAD Dec 13 14:50:15.408000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001a07a8 items=0 ppid=2396 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613963393238363030383532333037383566663364303234373031 Dec 13 14:50:15.439709 env[1136]: time="2024-12-13T14:50:15.439666831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-t7fls,Uid:e1881654-52ac-447a-a447-e45b4e7d921a,Namespace:default,Attempt:1,} returns sandbox id \"66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed\"" Dec 13 14:50:15.446978 env[1136]: time="2024-12-13T14:50:15.446922829Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:50:15.478873 kubelet[1423]: E1213 14:50:15.478821 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:15.672477 env[1136]: time="2024-12-13T14:50:15.672306049Z" level=info msg="StopPodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\"" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.788 [INFO][2443] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.788 [INFO][2443] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" iface="eth0" netns="/var/run/netns/cni-fbff6088-6b42-6e63-6c75-eb9ecb1c155b" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.789 [INFO][2443] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" iface="eth0" netns="/var/run/netns/cni-fbff6088-6b42-6e63-6c75-eb9ecb1c155b" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.789 [INFO][2443] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" iface="eth0" netns="/var/run/netns/cni-fbff6088-6b42-6e63-6c75-eb9ecb1c155b" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.790 [INFO][2443] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.790 [INFO][2443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.846 [INFO][2449] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.847 [INFO][2449] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.847 [INFO][2449] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.865 [WARNING][2449] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.865 [INFO][2449] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.869 [INFO][2449] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:15.878023 env[1136]: 2024-12-13 14:50:15.874 [INFO][2443] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:15.879710 env[1136]: time="2024-12-13T14:50:15.879156567Z" level=info msg="TearDown network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" successfully" Dec 13 14:50:15.879710 env[1136]: time="2024-12-13T14:50:15.879232618Z" level=info msg="StopPodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" returns successfully" Dec 13 14:50:15.881537 env[1136]: time="2024-12-13T14:50:15.881466323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6gz2f,Uid:288add20-1b47-41cd-995d-fca300f12b3c,Namespace:calico-system,Attempt:1,}" Dec 13 14:50:16.018151 systemd[1]: run-netns-cni\x2dfbff6088\x2d6b42\x2d6e63\x2d6c75\x2deb9ecb1c155b.mount: Deactivated successfully. Dec 13 14:50:16.162516 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:50:16.162751 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali957139cd198: link becomes ready Dec 13 14:50:16.159655 systemd-networkd[968]: cali957139cd198: Link UP Dec 13 14:50:16.162537 systemd-networkd[968]: cali957139cd198: Gained carrier Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:15.993 [INFO][2458] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.107-k8s-csi--node--driver--6gz2f-eth0 csi-node-driver- calico-system 288add20-1b47-41cd-995d-fca300f12b3c 1134 0 2024-12-13 14:49:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.107 csi-node-driver-6gz2f eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali957139cd198 [] []}} ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:15.993 [INFO][2458] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.068 [INFO][2470] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" HandleID="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.087 [INFO][2470] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" HandleID="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000eeaa0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.107", "pod":"csi-node-driver-6gz2f", "timestamp":"2024-12-13 14:50:16.06811781 +0000 UTC"}, Hostname:"172.24.4.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.087 [INFO][2470] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.087 [INFO][2470] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.088 [INFO][2470] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.107' Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.091 [INFO][2470] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.100 [INFO][2470] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.108 [INFO][2470] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.113 [INFO][2470] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.120 [INFO][2470] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.120 [INFO][2470] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.125 [INFO][2470] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453 Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.133 [INFO][2470] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.150 [INFO][2470] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.66/26] block=192.168.97.64/26 handle="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.150 [INFO][2470] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.66/26] handle="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" host="172.24.4.107" Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.150 [INFO][2470] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:16.185374 env[1136]: 2024-12-13 14:50:16.150 [INFO][2470] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.66/26] IPv6=[] ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" HandleID="k8s-pod-network.bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.187048 env[1136]: 2024-12-13 14:50:16.154 [INFO][2458] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-csi--node--driver--6gz2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"288add20-1b47-41cd-995d-fca300f12b3c", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"", Pod:"csi-node-driver-6gz2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali957139cd198", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:16.187048 env[1136]: 2024-12-13 14:50:16.154 [INFO][2458] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.66/32] ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.187048 env[1136]: 2024-12-13 14:50:16.154 [INFO][2458] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali957139cd198 ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.187048 env[1136]: 2024-12-13 14:50:16.163 [INFO][2458] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.187048 env[1136]: 2024-12-13 14:50:16.165 [INFO][2458] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-csi--node--driver--6gz2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"288add20-1b47-41cd-995d-fca300f12b3c", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453", Pod:"csi-node-driver-6gz2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali957139cd198", MAC:"76:4c:94:84:8d:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:16.187048 env[1136]: 2024-12-13 14:50:16.182 [INFO][2458] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453" Namespace="calico-system" Pod="csi-node-driver-6gz2f" WorkloadEndpoint="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:16.214000 audit[2493]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:16.214000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fffa1371770 a2=0 a3=7fffa137175c items=0 ppid=2150 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:16.214000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:16.222272 env[1136]: time="2024-12-13T14:50:16.222102580Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:16.222272 env[1136]: time="2024-12-13T14:50:16.222221091Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:16.222681 env[1136]: time="2024-12-13T14:50:16.222554643Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:16.223342 env[1136]: time="2024-12-13T14:50:16.223122482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453 pid=2499 runtime=io.containerd.runc.v2 Dec 13 14:50:16.253124 systemd[1]: Started cri-containerd-bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453.scope. Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.272000 audit: BPF prog-id=104 op=LOAD Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2499 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:16.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265653430656662643161316333353261306432666562336638383036 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2499 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:16.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265653430656662643161316333353261306432666562336638383036 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.275000 audit: BPF prog-id=105 op=LOAD Dec 13 14:50:16.275000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002bddb0 items=0 ppid=2499 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:16.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265653430656662643161316333353261306432666562336638383036 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit: BPF prog-id=106 op=LOAD Dec 13 14:50:16.276000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002bddf8 items=0 ppid=2499 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:16.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265653430656662643161316333353261306432666562336638383036 Dec 13 14:50:16.276000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:50:16.276000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:16.276000 audit: BPF prog-id=107 op=LOAD Dec 13 14:50:16.276000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00038c208 items=0 ppid=2499 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:16.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265653430656662643161316333353261306432666562336638383036 Dec 13 14:50:16.292871 env[1136]: time="2024-12-13T14:50:16.292812735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6gz2f,Uid:288add20-1b47-41cd-995d-fca300f12b3c,Namespace:calico-system,Attempt:1,} returns sandbox id \"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453\"" Dec 13 14:50:16.479964 kubelet[1423]: E1213 14:50:16.479869 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:16.840302 systemd-networkd[968]: vxlan.calico: Gained IPv6LL Dec 13 14:50:17.289710 systemd-networkd[968]: cali887f5c8250f: Gained IPv6LL Dec 13 14:50:17.290440 systemd-networkd[968]: cali957139cd198: Gained IPv6LL Dec 13 14:50:17.481596 kubelet[1423]: E1213 14:50:17.481486 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:18.481962 kubelet[1423]: E1213 14:50:18.481908 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:19.482992 kubelet[1423]: E1213 14:50:19.482882 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:19.739656 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3299026322.mount: Deactivated successfully. Dec 13 14:50:20.446473 kubelet[1423]: E1213 14:50:20.446391 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:20.483806 kubelet[1423]: E1213 14:50:20.483745 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:21.484921 kubelet[1423]: E1213 14:50:21.484851 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:21.964097 env[1136]: time="2024-12-13T14:50:21.963986057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:21.969299 env[1136]: time="2024-12-13T14:50:21.969222208Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:21.973932 env[1136]: time="2024-12-13T14:50:21.973865113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:21.978024 env[1136]: time="2024-12-13T14:50:21.977970964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:21.980201 env[1136]: time="2024-12-13T14:50:21.980140532Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:50:21.983286 env[1136]: time="2024-12-13T14:50:21.983216874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:50:21.985184 env[1136]: time="2024-12-13T14:50:21.985124743Z" level=info msg="CreateContainer within sandbox \"66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:50:22.017348 env[1136]: time="2024-12-13T14:50:22.017264814Z" level=info msg="CreateContainer within sandbox \"66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"d661114504d936e458d6fec60b2a8873f52bc0f5f085c7f6dd57a474b29f1f91\"" Dec 13 14:50:22.019305 env[1136]: time="2024-12-13T14:50:22.019205236Z" level=info msg="StartContainer for \"d661114504d936e458d6fec60b2a8873f52bc0f5f085c7f6dd57a474b29f1f91\"" Dec 13 14:50:22.065683 systemd[1]: Started cri-containerd-d661114504d936e458d6fec60b2a8873f52bc0f5f085c7f6dd57a474b29f1f91.scope. Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.093880 kernel: kauditd_printk_skb: 668 callbacks suppressed Dec 13 14:50:22.093952 kernel: audit: type=1400 audit(1734101422.090:589): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.100018 kernel: audit: type=1400 audit(1734101422.090:590): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.103428 kernel: audit: type=1400 audit(1734101422.090:591): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.103471 kernel: audit: type=1400 audit(1734101422.090:592): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.110939 kernel: audit: type=1400 audit(1734101422.090:593): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.110982 kernel: audit: type=1400 audit(1734101422.090:594): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.119359 kernel: audit: type=1400 audit(1734101422.090:595): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.122780 kernel: audit: type=1400 audit(1734101422.090:596): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.126230 kernel: audit: type=1400 audit(1734101422.090:597): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.130103 kernel: audit: type=1400 audit(1734101422.091:598): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit: BPF prog-id=108 op=LOAD Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2396 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363131313435303464393336653435386436666563363062326138 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2396 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363131313435303464393336653435386436666563363062326138 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.091000 audit: BPF prog-id=109 op=LOAD Dec 13 14:50:22.091000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e9d10 items=0 ppid=2396 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363131313435303464393336653435386436666563363062326138 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.092000 audit: BPF prog-id=110 op=LOAD Dec 13 14:50:22.092000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e9d58 items=0 ppid=2396 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363131313435303464393336653435386436666563363062326138 Dec 13 14:50:22.095000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:50:22.095000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.095000 audit: BPF prog-id=111 op=LOAD Dec 13 14:50:22.095000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002d4168 items=0 ppid=2396 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363131313435303464393336653435386436666563363062326138 Dec 13 14:50:22.485819 kubelet[1423]: E1213 14:50:22.485721 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:22.664542 env[1136]: time="2024-12-13T14:50:22.662748888Z" level=info msg="StartContainer for \"d661114504d936e458d6fec60b2a8873f52bc0f5f085c7f6dd57a474b29f1f91\" returns successfully" Dec 13 14:50:23.486495 kubelet[1423]: E1213 14:50:23.486408 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:24.444171 env[1136]: time="2024-12-13T14:50:24.444128973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:24.447670 env[1136]: time="2024-12-13T14:50:24.447649616Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:24.450334 env[1136]: time="2024-12-13T14:50:24.450314950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:24.452936 env[1136]: time="2024-12-13T14:50:24.452916438Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:24.453596 env[1136]: time="2024-12-13T14:50:24.453571941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:50:24.457313 env[1136]: time="2024-12-13T14:50:24.457254696Z" level=info msg="CreateContainer within sandbox \"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:50:24.487980 kubelet[1423]: E1213 14:50:24.487924 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:24.491452 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3961184729.mount: Deactivated successfully. Dec 13 14:50:24.496017 env[1136]: time="2024-12-13T14:50:24.495971804Z" level=info msg="CreateContainer within sandbox \"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d761cbd9450b438471ea8f2a8971f3a8e3cb4aeac0159c6b5e4c6546a34868d1\"" Dec 13 14:50:24.497200 env[1136]: time="2024-12-13T14:50:24.497174680Z" level=info msg="StartContainer for \"d761cbd9450b438471ea8f2a8971f3a8e3cb4aeac0159c6b5e4c6546a34868d1\"" Dec 13 14:50:24.552174 systemd[1]: Started cri-containerd-d761cbd9450b438471ea8f2a8971f3a8e3cb4aeac0159c6b5e4c6546a34868d1.scope. Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7b8707f2f8 items=0 ppid=2499 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:24.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363163626439343530623433383437316561386632613839373166 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.658000 audit: BPF prog-id=112 op=LOAD Dec 13 14:50:24.658000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024828 items=0 ppid=2499 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:24.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363163626439343530623433383437316561386632613839373166 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.660000 audit: BPF prog-id=113 op=LOAD Dec 13 14:50:24.660000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024878 items=0 ppid=2499 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:24.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363163626439343530623433383437316561386632613839373166 Dec 13 14:50:24.664000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:50:24.664000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:24.664000 audit: BPF prog-id=114 op=LOAD Dec 13 14:50:24.664000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024908 items=0 ppid=2499 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:24.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363163626439343530623433383437316561386632613839373166 Dec 13 14:50:24.767879 env[1136]: time="2024-12-13T14:50:24.767528160Z" level=info msg="StartContainer for \"d761cbd9450b438471ea8f2a8971f3a8e3cb4aeac0159c6b5e4c6546a34868d1\" returns successfully" Dec 13 14:50:24.773130 env[1136]: time="2024-12-13T14:50:24.773024510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:50:25.488763 kubelet[1423]: E1213 14:50:25.488680 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:26.489749 kubelet[1423]: E1213 14:50:26.489661 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:27.215600 env[1136]: time="2024-12-13T14:50:27.215484824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:27.218684 env[1136]: time="2024-12-13T14:50:27.218562252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:27.221901 env[1136]: time="2024-12-13T14:50:27.221809206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:27.224794 env[1136]: time="2024-12-13T14:50:27.224743746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:27.226267 env[1136]: time="2024-12-13T14:50:27.226213801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:50:27.231138 env[1136]: time="2024-12-13T14:50:27.231086060Z" level=info msg="CreateContainer within sandbox \"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:50:27.266439 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount897680734.mount: Deactivated successfully. Dec 13 14:50:27.273450 env[1136]: time="2024-12-13T14:50:27.273366237Z" level=info msg="CreateContainer within sandbox \"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"528b3e04b5c2b46dc765ed0d5ffa505ff0ea25ea455c9dadeb137903420e974c\"" Dec 13 14:50:27.276027 env[1136]: time="2024-12-13T14:50:27.275975309Z" level=info msg="StartContainer for \"528b3e04b5c2b46dc765ed0d5ffa505ff0ea25ea455c9dadeb137903420e974c\"" Dec 13 14:50:27.338023 systemd[1]: Started cri-containerd-528b3e04b5c2b46dc765ed0d5ffa505ff0ea25ea455c9dadeb137903420e974c.scope. Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.355810 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 14:50:27.355893 kernel: audit: type=1400 audit(1734101427.353:613): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efc99b2ed58 items=0 ppid=2499 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.364018 kernel: audit: type=1300 audit(1734101427.353:613): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efc99b2ed58 items=0 ppid=2499 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.364182 kernel: audit: type=1327 audit(1734101427.353:613): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386233653034623563326234366463373635656430643566666135 Dec 13 14:50:27.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386233653034623563326234366463373635656430643566666135 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.372107 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.372151 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.378986 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.379028 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.385544 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.395066 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.395149 kernel: audit: type=1400 audit(1734101427.353:614): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.353000 audit: BPF prog-id=115 op=LOAD Dec 13 14:50:27.353000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000397f68 items=0 ppid=2499 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386233653034623563326234366463373635656430643566666135 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.362000 audit: BPF prog-id=116 op=LOAD Dec 13 14:50:27.362000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000397fb8 items=0 ppid=2499 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386233653034623563326234366463373635656430643566666135 Dec 13 14:50:27.367000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:50:27.367000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:27.367000 audit: BPF prog-id=117 op=LOAD Dec 13 14:50:27.367000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003fe048 items=0 ppid=2499 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386233653034623563326234366463373635656430643566666135 Dec 13 14:50:27.408711 env[1136]: time="2024-12-13T14:50:27.408030659Z" level=info msg="StartContainer for \"528b3e04b5c2b46dc765ed0d5ffa505ff0ea25ea455c9dadeb137903420e974c\" returns successfully" Dec 13 14:50:27.490810 kubelet[1423]: E1213 14:50:27.490596 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:27.622457 kubelet[1423]: I1213 14:50:27.622381 1423 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:50:27.626144 kubelet[1423]: I1213 14:50:27.626090 1423 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:50:27.950547 kubelet[1423]: I1213 14:50:27.950493 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-t7fls" podStartSLOduration=19.414938701 podStartE2EDuration="25.950408945s" podCreationTimestamp="2024-12-13 14:50:02 +0000 UTC" firstStartedPulling="2024-12-13 14:50:15.44551847 +0000 UTC m=+36.418722146" lastFinishedPulling="2024-12-13 14:50:21.980988675 +0000 UTC m=+42.954192390" observedRunningTime="2024-12-13 14:50:22.913704447 +0000 UTC m=+43.886908192" watchObservedRunningTime="2024-12-13 14:50:27.950408945 +0000 UTC m=+48.923612661" Dec 13 14:50:28.491771 kubelet[1423]: E1213 14:50:28.491705 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:29.492305 kubelet[1423]: E1213 14:50:29.492246 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:30.494310 kubelet[1423]: E1213 14:50:30.494190 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:31.495688 kubelet[1423]: E1213 14:50:31.495213 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:32.438000 audit[2680]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.443529 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 14:50:32.443726 kernel: audit: type=1325 audit(1734101432.438:619): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.438000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdbc54f360 a2=0 a3=7ffdbc54f34c items=0 ppid=1576 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.466757 kernel: audit: type=1300 audit(1734101432.438:619): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdbc54f360 a2=0 a3=7ffdbc54f34c items=0 ppid=1576 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.466895 kernel: audit: type=1327 audit(1734101432.438:619): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.452000 audit[2680]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.483282 kernel: audit: type=1325 audit(1734101432.452:620): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.483393 kernel: audit: type=1300 audit(1734101432.452:620): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdbc54f360 a2=0 a3=0 items=0 ppid=1576 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.452000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdbc54f360 a2=0 a3=0 items=0 ppid=1576 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.496187 kubelet[1423]: E1213 14:50:32.496119 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:32.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.508854 kernel: audit: type=1327 audit(1734101432.452:620): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.511000 audit[2684]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.511000 audit[2684]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcf31847a0 a2=0 a3=7ffcf318478c items=0 ppid=1576 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.520691 kernel: audit: type=1325 audit(1734101432.511:621): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.520823 kernel: audit: type=1300 audit(1734101432.511:621): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcf31847a0 a2=0 a3=7ffcf318478c items=0 ppid=1576 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.520883 kernel: audit: type=1327 audit(1734101432.511:621): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.523000 audit[2684]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.523000 audit[2684]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcf31847a0 a2=0 a3=0 items=0 ppid=1576 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:32.528721 kernel: audit: type=1325 audit(1734101432.523:622): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:32.579926 kubelet[1423]: I1213 14:50:32.579807 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-6gz2f" podStartSLOduration=41.646858682 podStartE2EDuration="52.579667736s" podCreationTimestamp="2024-12-13 14:49:40 +0000 UTC" firstStartedPulling="2024-12-13 14:50:16.294048219 +0000 UTC m=+37.267251884" lastFinishedPulling="2024-12-13 14:50:27.226857233 +0000 UTC m=+48.200060938" observedRunningTime="2024-12-13 14:50:27.951517305 +0000 UTC m=+48.924721020" watchObservedRunningTime="2024-12-13 14:50:32.579667736 +0000 UTC m=+53.552871451" Dec 13 14:50:32.580989 kubelet[1423]: I1213 14:50:32.580905 1423 topology_manager.go:215] "Topology Admit Handler" podUID="c5e1b05c-41a4-4fcb-bf85-4a8bbe013894" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:50:32.595725 systemd[1]: Created slice kubepods-besteffort-podc5e1b05c_41a4_4fcb_bf85_4a8bbe013894.slice. Dec 13 14:50:32.773091 kubelet[1423]: I1213 14:50:32.772939 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8kzg8\" (UniqueName: \"kubernetes.io/projected/c5e1b05c-41a4-4fcb-bf85-4a8bbe013894-kube-api-access-8kzg8\") pod \"nfs-server-provisioner-0\" (UID: \"c5e1b05c-41a4-4fcb-bf85-4a8bbe013894\") " pod="default/nfs-server-provisioner-0" Dec 13 14:50:32.773557 kubelet[1423]: I1213 14:50:32.773438 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c5e1b05c-41a4-4fcb-bf85-4a8bbe013894-data\") pod \"nfs-server-provisioner-0\" (UID: \"c5e1b05c-41a4-4fcb-bf85-4a8bbe013894\") " pod="default/nfs-server-provisioner-0" Dec 13 14:50:33.205848 env[1136]: time="2024-12-13T14:50:33.205050270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c5e1b05c-41a4-4fcb-bf85-4a8bbe013894,Namespace:default,Attempt:0,}" Dec 13 14:50:33.498401 kubelet[1423]: E1213 14:50:33.498121 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:33.543115 systemd-networkd[968]: cali60e51b789ff: Link UP Dec 13 14:50:33.551289 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:50:33.551421 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:50:33.552101 systemd-networkd[968]: cali60e51b789ff: Gained carrier Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.353 [INFO][2687] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.107-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c5e1b05c-41a4-4fcb-bf85-4a8bbe013894 1207 0 2024-12-13 14:50:32 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.107 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.353 [INFO][2687] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.437 [INFO][2698] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" HandleID="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Workload="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.464 [INFO][2698] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" HandleID="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Workload="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038e880), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.107", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:50:33.437673723 +0000 UTC"}, Hostname:"172.24.4.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.464 [INFO][2698] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.464 [INFO][2698] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.464 [INFO][2698] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.107' Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.468 [INFO][2698] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.478 [INFO][2698] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.488 [INFO][2698] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.493 [INFO][2698] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.500 [INFO][2698] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.500 [INFO][2698] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.506 [INFO][2698] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242 Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.518 [INFO][2698] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.530 [INFO][2698] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.67/26] block=192.168.97.64/26 handle="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.530 [INFO][2698] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.67/26] handle="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" host="172.24.4.107" Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.530 [INFO][2698] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:33.582159 env[1136]: 2024-12-13 14:50:33.530 [INFO][2698] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.67/26] IPv6=[] ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" HandleID="k8s-pod-network.d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Workload="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.585138 env[1136]: 2024-12-13 14:50:33.534 [INFO][2687] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c5e1b05c-41a4-4fcb-bf85-4a8bbe013894", ResourceVersion:"1207", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:33.585138 env[1136]: 2024-12-13 14:50:33.535 [INFO][2687] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.67/32] ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.585138 env[1136]: 2024-12-13 14:50:33.535 [INFO][2687] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.585138 env[1136]: 2024-12-13 14:50:33.554 [INFO][2687] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.585740 env[1136]: 2024-12-13 14:50:33.555 [INFO][2687] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c5e1b05c-41a4-4fcb-bf85-4a8bbe013894", ResourceVersion:"1207", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"52:64:c5:c0:0e:0b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:33.585740 env[1136]: 2024-12-13 14:50:33.577 [INFO][2687] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.107-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:50:33.613000 audit[2725]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:33.613000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff178d8f80 a2=0 a3=7fff178d8f6c items=0 ppid=2150 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.613000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:33.620166 env[1136]: time="2024-12-13T14:50:33.620070172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:33.620337 env[1136]: time="2024-12-13T14:50:33.620167083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:33.620337 env[1136]: time="2024-12-13T14:50:33.620200145Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:33.620602 env[1136]: time="2024-12-13T14:50:33.620542133Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242 pid=2728 runtime=io.containerd.runc.v2 Dec 13 14:50:33.649308 systemd[1]: Started cri-containerd-d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242.scope. Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.662000 audit: BPF prog-id=118 op=LOAD Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2728 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613232666333396466663661376466356462663763346138336636 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2728 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613232666333396466663661376466356462663763346138336636 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.664000 audit: BPF prog-id=119 op=LOAD Dec 13 14:50:33.664000 audit[2740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1ad0 items=0 ppid=2728 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613232666333396466663661376466356462663763346138336636 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.665000 audit: BPF prog-id=120 op=LOAD Dec 13 14:50:33.665000 audit[2740]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1b18 items=0 ppid=2728 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613232666333396466663661376466356462663763346138336636 Dec 13 14:50:33.666000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:50:33.666000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:33.666000 audit: BPF prog-id=121 op=LOAD Dec 13 14:50:33.666000 audit[2740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1f28 items=0 ppid=2728 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613232666333396466663661376466356462663763346138336636 Dec 13 14:50:33.698823 env[1136]: time="2024-12-13T14:50:33.698766696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c5e1b05c-41a4-4fcb-bf85-4a8bbe013894,Namespace:default,Attempt:0,} returns sandbox id \"d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242\"" Dec 13 14:50:33.701394 env[1136]: time="2024-12-13T14:50:33.701366904Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:50:33.907468 systemd[1]: run-containerd-runc-k8s.io-d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242-runc.p4VJGf.mount: Deactivated successfully. Dec 13 14:50:34.499221 kubelet[1423]: E1213 14:50:34.499155 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:35.272078 systemd-networkd[968]: cali60e51b789ff: Gained IPv6LL Dec 13 14:50:35.500046 kubelet[1423]: E1213 14:50:35.499924 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:35.877336 systemd[1]: run-containerd-runc-k8s.io-81f08413e2f81e3480010413cc4cd8ac03a5012bb391bd6f2bef8d1035067039-runc.TOCUrG.mount: Deactivated successfully. Dec 13 14:50:36.500446 kubelet[1423]: E1213 14:50:36.500401 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:37.501003 kubelet[1423]: E1213 14:50:37.500918 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:37.700652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount156206091.mount: Deactivated successfully. Dec 13 14:50:38.502216 kubelet[1423]: E1213 14:50:38.502033 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:39.503119 kubelet[1423]: E1213 14:50:39.502956 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:40.446284 kubelet[1423]: E1213 14:50:40.446216 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:40.503758 kubelet[1423]: E1213 14:50:40.503688 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:40.514514 env[1136]: time="2024-12-13T14:50:40.514452685Z" level=info msg="StopPodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\"" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.728 [WARNING][2809] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-csi--node--driver--6gz2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"288add20-1b47-41cd-995d-fca300f12b3c", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453", Pod:"csi-node-driver-6gz2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali957139cd198", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.728 [INFO][2809] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.728 [INFO][2809] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" iface="eth0" netns="" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.728 [INFO][2809] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.728 [INFO][2809] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.811 [INFO][2818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.811 [INFO][2818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.811 [INFO][2818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.824 [WARNING][2818] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.824 [INFO][2818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.827 [INFO][2818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:40.830259 env[1136]: 2024-12-13 14:50:40.828 [INFO][2809] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:40.831318 env[1136]: time="2024-12-13T14:50:40.830275056Z" level=info msg="TearDown network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" successfully" Dec 13 14:50:40.831318 env[1136]: time="2024-12-13T14:50:40.830320712Z" level=info msg="StopPodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" returns successfully" Dec 13 14:50:40.831318 env[1136]: time="2024-12-13T14:50:40.831182202Z" level=info msg="RemovePodSandbox for \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\"" Dec 13 14:50:40.831318 env[1136]: time="2024-12-13T14:50:40.831211247Z" level=info msg="Forcibly stopping sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\"" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:40.903 [WARNING][2839] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-csi--node--driver--6gz2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"288add20-1b47-41cd-995d-fca300f12b3c", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"bee40efbd1a1c352a0d2feb3f88069b5a08555ca98ae20cc7697b3dd155ba453", Pod:"csi-node-driver-6gz2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali957139cd198", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:40.904 [INFO][2839] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:40.904 [INFO][2839] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" iface="eth0" netns="" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:40.905 [INFO][2839] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:40.905 [INFO][2839] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.044 [INFO][2845] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.051 [INFO][2845] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.051 [INFO][2845] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.063 [WARNING][2845] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.063 [INFO][2845] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" HandleID="k8s-pod-network.26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Workload="172.24.4.107-k8s-csi--node--driver--6gz2f-eth0" Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.066 [INFO][2845] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:41.070367 env[1136]: 2024-12-13 14:50:41.068 [INFO][2839] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a" Dec 13 14:50:41.071037 env[1136]: time="2024-12-13T14:50:41.070436584Z" level=info msg="TearDown network for sandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" successfully" Dec 13 14:50:41.429566 env[1136]: time="2024-12-13T14:50:41.429462973Z" level=info msg="RemovePodSandbox \"26fa4994c2f79603374f1c8c13abb452d70c7b69a46f8ae6ef97d24821ac771a\" returns successfully" Dec 13 14:50:41.431602 env[1136]: time="2024-12-13T14:50:41.431549454Z" level=info msg="StopPodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\"" Dec 13 14:50:41.435049 env[1136]: time="2024-12-13T14:50:41.434996530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:41.442404 env[1136]: time="2024-12-13T14:50:41.442338238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:41.448384 env[1136]: time="2024-12-13T14:50:41.448327256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:41.454308 env[1136]: time="2024-12-13T14:50:41.454253637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:41.455511 env[1136]: time="2024-12-13T14:50:41.455450084Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:50:41.463015 env[1136]: time="2024-12-13T14:50:41.462903882Z" level=info msg="CreateContainer within sandbox \"d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:50:41.489440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4013062784.mount: Deactivated successfully. Dec 13 14:50:41.509259 kubelet[1423]: E1213 14:50:41.509170 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:41.510053 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1498266687.mount: Deactivated successfully. Dec 13 14:50:41.537953 env[1136]: time="2024-12-13T14:50:41.537894953Z" level=info msg="CreateContainer within sandbox \"d3a22fc39dff6a7df5dbf7c4a83f62014ba057b13b513d2fe4a1ab9e5953e242\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3e8842ec373610eb152e92c7e5d4d76edbb74200766829b5c0990b0eca9a5bab\"" Dec 13 14:50:41.539608 env[1136]: time="2024-12-13T14:50:41.539572259Z" level=info msg="StartContainer for \"3e8842ec373610eb152e92c7e5d4d76edbb74200766829b5c0990b0eca9a5bab\"" Dec 13 14:50:41.563922 systemd[1]: Started cri-containerd-3e8842ec373610eb152e92c7e5d4d76edbb74200766829b5c0990b0eca9a5bab.scope. Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.588757 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:50:41.588844 kernel: audit: type=1400 audit(1734101441.586:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.594550 kernel: audit: type=1400 audit(1734101441.586:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.599249 kernel: audit: type=1400 audit(1734101441.586:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.599299 kernel: audit: type=1400 audit(1734101441.586:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.606820 kernel: audit: type=1400 audit(1734101441.586:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.607484 kernel: audit: type=1400 audit(1734101441.586:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.621738 kernel: audit: type=1400 audit(1734101441.586:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.621812 kernel: audit: type=1400 audit(1734101441.586:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.629700 kernel: audit: type=1400 audit(1734101441.586:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.634406 env[1136]: time="2024-12-13T14:50:41.634361158Z" level=info msg="StartContainer for \"3e8842ec373610eb152e92c7e5d4d76edbb74200766829b5c0990b0eca9a5bab\" returns successfully" Dec 13 14:50:41.636637 kernel: audit: type=1400 audit(1734101441.586:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.586000 audit: BPF prog-id=122 op=LOAD Dec 13 14:50:41.594000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.594000 audit[2881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2728 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365383834326563333733363130656231353265393263376535643464 Dec 13 14:50:41.594000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.594000 audit[2881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2728 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365383834326563333733363130656231353265393263376535643464 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit: BPF prog-id=123 op=LOAD Dec 13 14:50:41.597000 audit[2881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033f850 items=0 ppid=2728 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365383834326563333733363130656231353265393263376535643464 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit: BPF prog-id=124 op=LOAD Dec 13 14:50:41.597000 audit[2881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033f898 items=0 ppid=2728 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365383834326563333733363130656231353265393263376535643464 Dec 13 14:50:41.597000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:50:41.597000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:41.597000 audit: BPF prog-id=125 op=LOAD Dec 13 14:50:41.597000 audit[2881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033fca8 items=0 ppid=2728 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365383834326563333733363130656231353265393263376535643464 Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.564 [WARNING][2866] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e1881654-52ac-447a-a447-e45b4e7d921a", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed", Pod:"nginx-deployment-6d5f899847-t7fls", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali887f5c8250f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.565 [INFO][2866] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.565 [INFO][2866] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" iface="eth0" netns="" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.565 [INFO][2866] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.565 [INFO][2866] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.616 [INFO][2891] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.616 [INFO][2891] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.616 [INFO][2891] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.638 [WARNING][2891] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.638 [INFO][2891] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.645 [INFO][2891] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:41.648050 env[1136]: 2024-12-13 14:50:41.646 [INFO][2866] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.648854 env[1136]: time="2024-12-13T14:50:41.648079739Z" level=info msg="TearDown network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" successfully" Dec 13 14:50:41.648854 env[1136]: time="2024-12-13T14:50:41.648114985Z" level=info msg="StopPodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" returns successfully" Dec 13 14:50:41.649387 env[1136]: time="2024-12-13T14:50:41.649353661Z" level=info msg="RemovePodSandbox for \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\"" Dec 13 14:50:41.649446 env[1136]: time="2024-12-13T14:50:41.649392384Z" level=info msg="Forcibly stopping sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\"" Dec 13 14:50:41.698000 audit[2935]: AVC avc: denied { search } for pid=2935 comm="rpcbind" name="crypto" dev="proc" ino=22752 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:50:41.698000 audit[2935]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fadff8340c0 a2=0 a3=0 items=0 ppid=2894 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 key=(null) Dec 13 14:50:41.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.695 [WARNING][2929] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e1881654-52ac-447a-a447-e45b4e7d921a", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"66a9c92860085230785ff3d02470132cdb1f4af48c36a2616cb023ff3850f2ed", Pod:"nginx-deployment-6d5f899847-t7fls", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali887f5c8250f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.695 [INFO][2929] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.695 [INFO][2929] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" iface="eth0" netns="" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.695 [INFO][2929] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.695 [INFO][2929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.725 [INFO][2936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.725 [INFO][2936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.725 [INFO][2936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.736 [WARNING][2936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.736 [INFO][2936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" HandleID="k8s-pod-network.e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Workload="172.24.4.107-k8s-nginx--deployment--6d5f899847--t7fls-eth0" Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.738 [INFO][2936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:41.741493 env[1136]: 2024-12-13 14:50:41.739 [INFO][2929] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098" Dec 13 14:50:41.742131 env[1136]: time="2024-12-13T14:50:41.741507374Z" level=info msg="TearDown network for sandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" successfully" Dec 13 14:50:41.747683 env[1136]: time="2024-12-13T14:50:41.747644529Z" level=info msg="RemovePodSandbox \"e054679f0a08cdfe11eb2cff17025d8ca9f2ebdebcf35569c97c8c7eb5b5c098\" returns successfully" Dec 13 14:50:41.750000 audit[2946]: AVC avc: denied { search } for pid=2946 comm="dbus-daemon" name="crypto" dev="proc" ino=22752 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:50:41.750000 audit[2946]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f561cd940c0 a2=0 a3=0 items=0 ppid=2894 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 key=(null) Dec 13 14:50:41.750000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:50:41.754000 audit[2947]: AVC avc: denied { watch } for pid=2947 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538702 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c101,c382 tclass=dir permissive=0 Dec 13 14:50:41.754000 audit[2947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55a78ad28040 a2=2c8 a3=7ffcc03536ac items=0 ppid=2894 pid=2947 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 key=(null) Dec 13 14:50:41.754000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:50:41.759000 audit[2948]: AVC avc: denied { read } for pid=2948 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22046 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:50:41.759000 audit[2948]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fbbe99e3320 a1=80000 a2=d a3=7ffd5d735160 items=0 ppid=2894 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 key=(null) Dec 13 14:50:41.759000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:50:41.760000 audit[2948]: AVC avc: denied { search } for pid=2948 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22752 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:50:41.760000 audit[2948]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbbe8f370c0 a2=0 a3=0 items=0 ppid=2894 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c382 key=(null) Dec 13 14:50:41.760000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:50:42.085231 kubelet[1423]: I1213 14:50:42.084969 1423 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.327103839 podStartE2EDuration="10.08484061s" podCreationTimestamp="2024-12-13 14:50:32 +0000 UTC" firstStartedPulling="2024-12-13 14:50:33.700569033 +0000 UTC m=+54.673772708" lastFinishedPulling="2024-12-13 14:50:41.458305764 +0000 UTC m=+62.431509479" observedRunningTime="2024-12-13 14:50:42.08388882 +0000 UTC m=+63.057092545" watchObservedRunningTime="2024-12-13 14:50:42.08484061 +0000 UTC m=+63.058044325" Dec 13 14:50:42.144000 audit[2953]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:42.144000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb05fc620 a2=0 a3=7ffdb05fc60c items=0 ppid=1576 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:42.153000 audit[2953]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:42.153000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb05fc620 a2=0 a3=7ffdb05fc60c items=0 ppid=1576 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:42.510430 kubelet[1423]: E1213 14:50:42.510252 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:43.511093 kubelet[1423]: E1213 14:50:43.511025 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:44.512025 kubelet[1423]: E1213 14:50:44.511955 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:45.513875 kubelet[1423]: E1213 14:50:45.513774 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:46.514890 kubelet[1423]: E1213 14:50:46.514793 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:47.515678 kubelet[1423]: E1213 14:50:47.515578 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:48.517600 kubelet[1423]: E1213 14:50:48.517531 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:49.518813 kubelet[1423]: E1213 14:50:49.518747 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:50.519957 kubelet[1423]: E1213 14:50:50.519894 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:51.521835 kubelet[1423]: E1213 14:50:51.521771 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:52.523691 kubelet[1423]: E1213 14:50:52.523584 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:53.524410 kubelet[1423]: E1213 14:50:53.524316 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:54.525347 kubelet[1423]: E1213 14:50:54.525276 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:55.527064 kubelet[1423]: E1213 14:50:55.526981 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:56.527892 kubelet[1423]: E1213 14:50:56.527826 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:57.528545 kubelet[1423]: E1213 14:50:57.528486 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:58.530041 kubelet[1423]: E1213 14:50:58.529971 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:59.530977 kubelet[1423]: E1213 14:50:59.530874 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:00.445344 kubelet[1423]: E1213 14:51:00.445302 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:00.531862 kubelet[1423]: E1213 14:51:00.531829 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:01.533294 kubelet[1423]: E1213 14:51:01.533235 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:02.534742 kubelet[1423]: E1213 14:51:02.534603 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:03.535127 kubelet[1423]: E1213 14:51:03.535024 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:04.535797 kubelet[1423]: E1213 14:51:04.535739 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:05.537107 kubelet[1423]: E1213 14:51:05.536980 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:05.845271 systemd[1]: run-containerd-runc-k8s.io-81f08413e2f81e3480010413cc4cd8ac03a5012bb391bd6f2bef8d1035067039-runc.xYSD0B.mount: Deactivated successfully. Dec 13 14:51:06.537873 kubelet[1423]: E1213 14:51:06.537732 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:06.941491 kubelet[1423]: I1213 14:51:06.941441 1423 topology_manager.go:215] "Topology Admit Handler" podUID="b13ccf63-e2b6-42d4-bb75-88f14104d048" podNamespace="default" podName="test-pod-1" Dec 13 14:51:06.953582 systemd[1]: Created slice kubepods-besteffort-podb13ccf63_e2b6_42d4_bb75_88f14104d048.slice. Dec 13 14:51:07.129031 kubelet[1423]: I1213 14:51:07.128945 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f038c678-768e-4453-91f5-776c29948ebc\" (UniqueName: \"kubernetes.io/nfs/b13ccf63-e2b6-42d4-bb75-88f14104d048-pvc-f038c678-768e-4453-91f5-776c29948ebc\") pod \"test-pod-1\" (UID: \"b13ccf63-e2b6-42d4-bb75-88f14104d048\") " pod="default/test-pod-1" Dec 13 14:51:07.129294 kubelet[1423]: I1213 14:51:07.129061 1423 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2wc29\" (UniqueName: \"kubernetes.io/projected/b13ccf63-e2b6-42d4-bb75-88f14104d048-kube-api-access-2wc29\") pod \"test-pod-1\" (UID: \"b13ccf63-e2b6-42d4-bb75-88f14104d048\") " pod="default/test-pod-1" Dec 13 14:51:07.300827 kernel: Failed to create system directory netfs Dec 13 14:51:07.302000 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:51:07.302075 kernel: audit: type=1400 audit(1734101467.291:667): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.291000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.315471 kernel: Failed to create system directory netfs Dec 13 14:51:07.315577 kernel: audit: type=1400 audit(1734101467.291:667): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.291000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.327518 kernel: Failed to create system directory netfs Dec 13 14:51:07.327654 kernel: audit: type=1400 audit(1734101467.291:667): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.291000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.291000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.336647 kernel: Failed to create system directory netfs Dec 13 14:51:07.336768 kernel: audit: type=1400 audit(1734101467.291:667): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.291000 audit[3009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c7acd6f5e0 a1=153bc a2=55c7a7b122b0 a3=5 items=0 ppid=56 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.291000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:07.362256 kernel: audit: type=1300 audit(1734101467.291:667): arch=c000003e syscall=175 success=yes exit=0 a0=55c7acd6f5e0 a1=153bc a2=55c7a7b122b0 a3=5 items=0 ppid=56 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.362389 kernel: audit: type=1327 audit(1734101467.291:667): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:07.382276 kernel: Failed to create system directory fscache Dec 13 14:51:07.382433 kernel: audit: type=1400 audit(1734101467.367:668): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.382501 kernel: Failed to create system directory fscache Dec 13 14:51:07.382550 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.389673 kernel: audit: type=1400 audit(1734101467.367:668): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.389821 kernel: Failed to create system directory fscache Dec 13 14:51:07.389853 kernel: audit: type=1400 audit(1734101467.367:668): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.395965 kernel: Failed to create system directory fscache Dec 13 14:51:07.396020 kernel: audit: type=1400 audit(1734101467.367:668): avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.398565 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.405092 kernel: Failed to create system directory fscache Dec 13 14:51:07.405199 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.407111 kernel: Failed to create system directory fscache Dec 13 14:51:07.407212 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.408113 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.409094 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.410022 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.410930 kernel: Failed to create system directory fscache Dec 13 14:51:07.367000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.415695 kernel: FS-Cache: Loaded Dec 13 14:51:07.367000 audit[3009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c7acf849c0 a1=4c0fc a2=55c7a7b122b0 a3=5 items=0 ppid=56 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.367000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.460690 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.460781 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.460837 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.462493 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.462572 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.463456 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.468168 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.469144 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.470073 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.471049 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.472019 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.473000 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.473917 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.474845 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.475868 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.476904 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.477828 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.478764 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.479739 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.480735 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.481775 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.483670 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.483791 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.484537 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.485581 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.486539 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.487469 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.488364 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.489337 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.490234 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.491124 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.492008 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.492954 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.493918 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.494861 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.495860 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.496867 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.497927 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.499024 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.499992 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.501018 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.502065 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.503191 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.504259 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.505338 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.506361 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.507425 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.508363 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.509419 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.510418 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.511381 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.512359 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.513536 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.514549 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.515535 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.516551 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.517500 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.518390 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.519277 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.520295 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.521347 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.522360 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.523380 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.524252 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.525315 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.526421 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.527676 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.528905 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.529793 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.531534 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.531681 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.532430 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.533382 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.534317 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.535313 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.537453 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.537589 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.538665 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.538832 kubelet[1423]: E1213 14:51:07.538328 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:07.539703 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.540407 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.542354 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.542474 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.543272 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.544322 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.545347 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.546306 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.547188 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.548119 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.549070 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.550027 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.550981 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.551921 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.552886 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.553854 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.560848 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.561155 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.561228 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.561279 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.561330 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.561380 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.561430 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.564263 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.564348 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.564406 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.566331 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.566399 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.567122 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.568177 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.569091 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.570074 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.571049 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.572033 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.573138 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.575261 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.575412 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.577256 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.577387 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.579251 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.579404 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.580227 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.582201 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.582322 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.584178 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.584308 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.585312 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.442000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.587380 kernel: Failed to create system directory sunrpc Dec 13 14:51:07.601372 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:51:07.601516 kernel: RPC: Registered udp transport module. Dec 13 14:51:07.601570 kernel: RPC: Registered tcp transport module. Dec 13 14:51:07.602250 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:51:07.442000 audit[3009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c7acfd0ad0 a1=1a7f1c a2=55c7a7b122b0 a3=5 items=6 ppid=56 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.442000 audit: CWD cwd="/" Dec 13 14:51:07.442000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:07.442000 audit: PATH item=1 name=(null) inode=22334 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:07.442000 audit: PATH item=2 name=(null) inode=22334 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:07.442000 audit: PATH item=3 name=(null) inode=22335 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:07.442000 audit: PATH item=4 name=(null) inode=22334 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:07.442000 audit: PATH item=5 name=(null) inode=22336 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:07.442000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.660376 kernel: Failed to create system directory nfs Dec 13 14:51:07.660531 kernel: Failed to create system directory nfs Dec 13 14:51:07.660600 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.661197 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.662096 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.663016 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.663915 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.664790 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.666598 kernel: Failed to create system directory nfs Dec 13 14:51:07.666743 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.667518 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.668431 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.669309 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.670176 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.671107 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.671895 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.672817 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.674592 kernel: Failed to create system directory nfs Dec 13 14:51:07.674745 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.675501 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.676419 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.677341 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.678262 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.679225 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.680115 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.681034 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.681973 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.682848 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.684693 kernel: Failed to create system directory nfs Dec 13 14:51:07.684846 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.686568 kernel: Failed to create system directory nfs Dec 13 14:51:07.686845 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.687505 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.688494 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.690421 kernel: Failed to create system directory nfs Dec 13 14:51:07.690561 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.691316 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.692299 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.694330 kernel: Failed to create system directory nfs Dec 13 14:51:07.694484 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.695165 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.696184 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.698077 kernel: Failed to create system directory nfs Dec 13 14:51:07.698210 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.699065 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.700117 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.702048 kernel: Failed to create system directory nfs Dec 13 14:51:07.702200 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.702895 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.703839 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.704779 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.705815 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.707567 kernel: Failed to create system directory nfs Dec 13 14:51:07.707705 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.708454 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.709362 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.714090 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.714985 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.715905 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.716833 kernel: Failed to create system directory nfs Dec 13 14:51:07.646000 audit[3009]: AVC avc: denied { confidentiality } for pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.743771 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:51:07.646000 audit[3009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c7ad1f1700 a1=16e97c a2=55c7a7b122b0 a3=5 items=0 ppid=56 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.646000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.797427 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.797593 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.797690 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.798286 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.799225 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.800118 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.801041 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.801980 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.802930 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.803833 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.804780 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.806597 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.806748 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.807548 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.808508 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.809439 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.810367 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.811280 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.817811 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.818051 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.818131 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.818190 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.818236 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.818284 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.818329 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.818943 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.821817 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.821969 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.822028 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.823681 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.823817 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.824601 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.825575 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.826533 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.827491 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.828451 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.829445 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.831325 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.831456 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.832299 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.834219 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.834414 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.835175 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.836058 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.837122 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.838031 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.839984 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.840134 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.841183 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.842947 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.843099 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.843859 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.844804 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.846656 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.846756 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.847525 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.849415 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.849561 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.850338 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.851269 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.852223 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.853216 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.854068 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.855017 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.855962 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.856915 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.857840 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.859663 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.859791 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.860506 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.861406 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.862266 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.863202 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.864244 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.865115 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.866054 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.867000 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.867895 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.868852 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.870573 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.870711 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.871504 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.872438 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.873374 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.874281 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.875156 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.876070 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.877028 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.877913 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.878826 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.879771 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.881669 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.881747 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:07.882537 kernel: Failed to create system directory nfs4 Dec 13 14:51:07.777000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.050778 kernel: NFS: Registering the id_resolver key type Dec 13 14:51:08.051029 kernel: Key type id_resolver registered Dec 13 14:51:08.051087 kernel: Key type id_legacy registered Dec 13 14:51:07.777000 audit[3014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe738f66010 a1=208de4 a2=5589eb2b52b0 a3=5 items=0 ppid=56 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.777000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.070201 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.070256 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.071261 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.072371 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.074780 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.074825 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.075924 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.077047 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.078378 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.079471 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.080514 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.081559 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.083491 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.083521 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.084635 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.086823 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.086861 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.087898 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.088981 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.090011 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.091076 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.092151 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.093214 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.094326 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.095336 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.096392 kernel: Failed to create system directory rpcgss Dec 13 14:51:08.063000 audit[3015]: AVC avc: denied { confidentiality } for pid=3015 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:08.063000 audit[3015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8941684010 a1=70af4 a2=5627263102b0 a3=5 items=0 ppid=56 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.063000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:51:08.155083 nfsidmap[3023]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 14:51:08.185534 nfsidmap[3024]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 14:51:08.204000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:08.204000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:08.204000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:08.205000 audit[1217]: AVC avc: denied { watch_reads } for pid=1217 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:08.205000 audit[1217]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ea5d52a50 a2=10 a3=8b8ff7f1e620781 items=0 ppid=1 pid=1217 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:51:08.205000 audit[1217]: AVC avc: denied { watch_reads } for pid=1217 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:08.205000 audit[1217]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ea5d52a50 a2=10 a3=8b8ff7f1e620781 items=0 ppid=1 pid=1217 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:51:08.205000 audit[1217]: AVC avc: denied { watch_reads } for pid=1217 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:08.205000 audit[1217]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ea5d52a50 a2=10 a3=8b8ff7f1e620781 items=0 ppid=1 pid=1217 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:51:08.461482 env[1136]: time="2024-12-13T14:51:08.461248281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b13ccf63-e2b6-42d4-bb75-88f14104d048,Namespace:default,Attempt:0,}" Dec 13 14:51:08.539703 kubelet[1423]: E1213 14:51:08.539543 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:08.766775 systemd-networkd[968]: cali5ec59c6bf6e: Link UP Dec 13 14:51:08.775319 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:51:08.775847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:51:08.776195 systemd-networkd[968]: cali5ec59c6bf6e: Gained carrier Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.585 [INFO][3026] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.107-k8s-test--pod--1-eth0 default b13ccf63-e2b6-42d4-bb75-88f14104d048 1314 0 2024-12-13 14:50:35 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.107 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.586 [INFO][3026] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.658 [INFO][3036] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" HandleID="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Workload="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.685 [INFO][3036] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" HandleID="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Workload="172.24.4.107-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038a380), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.107", "pod":"test-pod-1", "timestamp":"2024-12-13 14:51:08.658837909 +0000 UTC"}, Hostname:"172.24.4.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.685 [INFO][3036] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.686 [INFO][3036] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.686 [INFO][3036] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.107' Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.690 [INFO][3036] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.700 [INFO][3036] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.712 [INFO][3036] ipam/ipam.go 489: Trying affinity for 192.168.97.64/26 host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.717 [INFO][3036] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.724 [INFO][3036] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.64/26 host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.724 [INFO][3036] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.64/26 handle="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.729 [INFO][3036] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.743 [INFO][3036] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.64/26 handle="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.755 [INFO][3036] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.68/26] block=192.168.97.64/26 handle="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.755 [INFO][3036] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.68/26] handle="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" host="172.24.4.107" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.755 [INFO][3036] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.755 [INFO][3036] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.68/26] IPv6=[] ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" HandleID="k8s-pod-network.1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Workload="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.801348 env[1136]: 2024-12-13 14:51:08.760 [INFO][3026] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b13ccf63-e2b6-42d4-bb75-88f14104d048", ResourceVersion:"1314", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:08.803211 env[1136]: 2024-12-13 14:51:08.760 [INFO][3026] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.68/32] ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.803211 env[1136]: 2024-12-13 14:51:08.760 [INFO][3026] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.803211 env[1136]: 2024-12-13 14:51:08.777 [INFO][3026] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.803211 env[1136]: 2024-12-13 14:51:08.778 [INFO][3026] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.107-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b13ccf63-e2b6-42d4-bb75-88f14104d048", ResourceVersion:"1314", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.107", ContainerID:"1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3e:96:2e:49:c9:76", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:08.803211 env[1136]: 2024-12-13 14:51:08.794 [INFO][3026] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.107-k8s-test--pod--1-eth0" Dec 13 14:51:08.828000 audit[3051]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:51:08.828000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe0f3d4c30 a2=0 a3=7ffe0f3d4c1c items=0 ppid=2150 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.828000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:51:08.849683 env[1136]: time="2024-12-13T14:51:08.849564538Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:51:08.849683 env[1136]: time="2024-12-13T14:51:08.849687699Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:51:08.849925 env[1136]: time="2024-12-13T14:51:08.849720260Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:51:08.850114 env[1136]: time="2024-12-13T14:51:08.850072560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef pid=3064 runtime=io.containerd.runc.v2 Dec 13 14:51:08.874955 systemd[1]: Started cri-containerd-1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef.scope. Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.889000 audit: BPF prog-id=126 op=LOAD Dec 13 14:51:08.890000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.890000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3064 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366163343333336138616361323332373565336361363235363435 Dec 13 14:51:08.890000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.890000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3064 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366163343333336138616361323332373565336361363235363435 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.891000 audit: BPF prog-id=127 op=LOAD Dec 13 14:51:08.891000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000391020 items=0 ppid=3064 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366163343333336138616361323332373565336361363235363435 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit: BPF prog-id=128 op=LOAD Dec 13 14:51:08.892000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000391068 items=0 ppid=3064 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366163343333336138616361323332373565336361363235363435 Dec 13 14:51:08.892000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:51:08.892000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:08.892000 audit: BPF prog-id=129 op=LOAD Dec 13 14:51:08.892000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000391478 items=0 ppid=3064 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:08.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162366163343333336138616361323332373565336361363235363435 Dec 13 14:51:08.925783 env[1136]: time="2024-12-13T14:51:08.925707698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b13ccf63-e2b6-42d4-bb75-88f14104d048,Namespace:default,Attempt:0,} returns sandbox id \"1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef\"" Dec 13 14:51:08.928305 env[1136]: time="2024-12-13T14:51:08.928252092Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:51:09.360278 env[1136]: time="2024-12-13T14:51:09.360010985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:09.363785 env[1136]: time="2024-12-13T14:51:09.363714810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:09.368247 env[1136]: time="2024-12-13T14:51:09.368157238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:09.372326 env[1136]: time="2024-12-13T14:51:09.372255391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:09.374690 env[1136]: time="2024-12-13T14:51:09.374583449Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:51:09.381094 env[1136]: time="2024-12-13T14:51:09.381002758Z" level=info msg="CreateContainer within sandbox \"1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:51:09.410727 env[1136]: time="2024-12-13T14:51:09.410557605Z" level=info msg="CreateContainer within sandbox \"1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"61d3b182b35b93749d568a42cbdc7923045fa1020e5faa8ff88e929e8e0ff524\"" Dec 13 14:51:09.412755 env[1136]: time="2024-12-13T14:51:09.412650904Z" level=info msg="StartContainer for \"61d3b182b35b93749d568a42cbdc7923045fa1020e5faa8ff88e929e8e0ff524\"" Dec 13 14:51:09.450760 systemd[1]: Started cri-containerd-61d3b182b35b93749d568a42cbdc7923045fa1020e5faa8ff88e929e8e0ff524.scope. Dec 13 14:51:09.484759 systemd[1]: run-containerd-runc-k8s.io-1b6ac4333a8aca23275e3ca6256454a5d486f9a731a234f43cd75f26c51aceef-runc.tGGH73.mount: Deactivated successfully. Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.489000 audit: BPF prog-id=130 op=LOAD Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3064 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643362313832623335623933373439643536386134326362646337 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3064 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643362313832623335623933373439643536386134326362646337 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.491000 audit: BPF prog-id=131 op=LOAD Dec 13 14:51:09.491000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039d3b0 items=0 ppid=3064 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643362313832623335623933373439643536386134326362646337 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.493000 audit: BPF prog-id=132 op=LOAD Dec 13 14:51:09.493000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039d3f8 items=0 ppid=3064 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:09.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643362313832623335623933373439643536386134326362646337 Dec 13 14:51:09.494000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:51:09.495000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:09.495000 audit: BPF prog-id=133 op=LOAD Dec 13 14:51:09.495000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039d808 items=0 ppid=3064 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:09.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631643362313832623335623933373439643536386134326362646337 Dec 13 14:51:09.527783 env[1136]: time="2024-12-13T14:51:09.527714558Z" level=info msg="StartContainer for \"61d3b182b35b93749d568a42cbdc7923045fa1020e5faa8ff88e929e8e0ff524\" returns successfully" Dec 13 14:51:09.540361 kubelet[1423]: E1213 14:51:09.540302 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:10.152302 systemd-networkd[968]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:51:10.541072 kubelet[1423]: E1213 14:51:10.540545 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:11.541348 kubelet[1423]: E1213 14:51:11.541280 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:12.543487 kubelet[1423]: E1213 14:51:12.543373 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:13.544261 kubelet[1423]: E1213 14:51:13.544195 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:14.545911 kubelet[1423]: E1213 14:51:14.545840 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:15.547323 kubelet[1423]: E1213 14:51:15.547242 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:16.547895 kubelet[1423]: E1213 14:51:16.547750 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:17.548489 kubelet[1423]: E1213 14:51:17.548421 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:18.549921 kubelet[1423]: E1213 14:51:18.549841 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:19.550693 kubelet[1423]: E1213 14:51:19.550491 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:20.445976 kubelet[1423]: E1213 14:51:20.445916 1423 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:20.551110 kubelet[1423]: E1213 14:51:20.551072 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:21.552167 kubelet[1423]: E1213 14:51:21.552103 1423 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"