Dec 13 14:33:03.044762 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:33:03.044786 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:33:03.044800 kernel: BIOS-provided physical RAM map: Dec 13 14:33:03.044808 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:33:03.044816 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:33:03.044824 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:33:03.044833 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 14:33:03.044842 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 14:33:03.044851 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:33:03.044859 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:33:03.044866 kernel: NX (Execute Disable) protection: active Dec 13 14:33:03.044874 kernel: SMBIOS 2.8 present. Dec 13 14:33:03.044882 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 14:33:03.044890 kernel: Hypervisor detected: KVM Dec 13 14:33:03.044900 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:33:03.044910 kernel: kvm-clock: cpu 0, msr 7f19a001, primary cpu clock Dec 13 14:33:03.044918 kernel: kvm-clock: using sched offset of 9256502707 cycles Dec 13 14:33:03.044927 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:33:03.044936 kernel: tsc: Detected 1996.249 MHz processor Dec 13 14:33:03.044945 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:33:03.044954 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:33:03.044963 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 14:33:03.044972 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:33:03.044983 kernel: ACPI: Early table checksum verification disabled Dec 13 14:33:03.044992 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 14:33:03.045000 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:33:03.045009 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:33:03.045018 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:33:03.045026 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 14:33:03.045035 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:33:03.045044 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:33:03.045052 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 14:33:03.045063 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 14:33:03.045072 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 14:33:03.045080 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 14:33:03.045089 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 14:33:03.045097 kernel: No NUMA configuration found Dec 13 14:33:03.045106 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 14:33:03.045114 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 14:33:03.045123 kernel: Zone ranges: Dec 13 14:33:03.045139 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:33:03.045148 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 14:33:03.045157 kernel: Normal empty Dec 13 14:33:03.045166 kernel: Movable zone start for each node Dec 13 14:33:03.045175 kernel: Early memory node ranges Dec 13 14:33:03.045185 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:33:03.045196 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 14:33:03.045206 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 14:33:03.045214 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:33:03.045223 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:33:03.045233 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 14:33:03.045242 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:33:03.045251 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:33:03.045260 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:33:03.045269 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:33:03.045280 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:33:03.045289 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:33:03.045298 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:33:03.045308 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:33:03.045317 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:33:03.045325 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:33:03.045334 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 14:33:03.045359 kernel: Booting paravirtualized kernel on KVM Dec 13 14:33:03.045369 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:33:03.045380 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:33:03.045389 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:33:03.045398 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:33:03.045407 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:33:03.045416 kernel: kvm-guest: stealtime: cpu 0, msr 7fc1c0c0 Dec 13 14:33:03.045425 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 14:33:03.045434 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 14:33:03.045443 kernel: Policy zone: DMA32 Dec 13 14:33:03.045454 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:33:03.045465 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:33:03.045474 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:33:03.045483 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:33:03.045492 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:33:03.045502 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123076K reserved, 0K cma-reserved) Dec 13 14:33:03.045511 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:33:03.045520 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:33:03.045529 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:33:03.045540 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:33:03.045550 kernel: rcu: RCU event tracing is enabled. Dec 13 14:33:03.045559 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:33:03.045569 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:33:03.045578 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:33:03.045587 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:33:03.045596 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:33:03.045605 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:33:03.045614 kernel: Console: colour VGA+ 80x25 Dec 13 14:33:03.045625 kernel: printk: console [tty0] enabled Dec 13 14:33:03.045634 kernel: printk: console [ttyS0] enabled Dec 13 14:33:03.045643 kernel: ACPI: Core revision 20210730 Dec 13 14:33:03.045652 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:33:03.045661 kernel: x2apic enabled Dec 13 14:33:03.045670 kernel: Switched APIC routing to physical x2apic. Dec 13 14:33:03.045679 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:33:03.045688 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:33:03.045698 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 14:33:03.045710 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 14:33:03.045719 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 14:33:03.045728 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:33:03.045737 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:33:03.045746 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:33:03.045755 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:33:03.045764 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:33:03.045773 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 14:33:03.045782 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:33:03.045794 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:33:03.045803 kernel: LSM: Security Framework initializing Dec 13 14:33:03.045812 kernel: SELinux: Initializing. Dec 13 14:33:03.045821 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:33:03.045830 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:33:03.045839 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 14:33:03.045848 kernel: Performance Events: AMD PMU driver. Dec 13 14:33:03.045857 kernel: ... version: 0 Dec 13 14:33:03.045866 kernel: ... bit width: 48 Dec 13 14:33:03.045877 kernel: ... generic registers: 4 Dec 13 14:33:03.045893 kernel: ... value mask: 0000ffffffffffff Dec 13 14:33:03.045902 kernel: ... max period: 00007fffffffffff Dec 13 14:33:03.045914 kernel: ... fixed-purpose events: 0 Dec 13 14:33:03.045924 kernel: ... event mask: 000000000000000f Dec 13 14:33:03.045933 kernel: signal: max sigframe size: 1440 Dec 13 14:33:03.045943 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:33:03.045952 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:33:03.045961 kernel: x86: Booting SMP configuration: Dec 13 14:33:03.045973 kernel: .... node #0, CPUs: #1 Dec 13 14:33:03.045982 kernel: kvm-clock: cpu 1, msr 7f19a041, secondary cpu clock Dec 13 14:33:03.045991 kernel: kvm-guest: stealtime: cpu 1, msr 7fd1c0c0 Dec 13 14:33:03.046001 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:33:03.046010 kernel: smpboot: Max logical packages: 2 Dec 13 14:33:03.046020 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 14:33:03.046029 kernel: devtmpfs: initialized Dec 13 14:33:03.046038 kernel: x86/mm: Memory block size: 128MB Dec 13 14:33:03.046048 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:33:03.046059 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:33:03.046069 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:33:03.046078 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:33:03.046088 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:33:03.046098 kernel: audit: type=2000 audit(1734100382.892:1): state=initialized audit_enabled=0 res=1 Dec 13 14:33:03.046107 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:33:03.046116 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:33:03.046126 kernel: cpuidle: using governor menu Dec 13 14:33:03.046137 kernel: ACPI: bus type PCI registered Dec 13 14:33:03.046147 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:33:03.046156 kernel: dca service started, version 1.12.1 Dec 13 14:33:03.046165 kernel: PCI: Using configuration type 1 for base access Dec 13 14:33:03.046175 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:33:03.046184 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:33:03.046194 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:33:03.046203 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:33:03.046213 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:33:03.046222 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:33:03.046233 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:33:03.046243 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:33:03.046252 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:33:03.046262 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:33:03.046271 kernel: ACPI: Interpreter enabled Dec 13 14:33:03.046280 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:33:03.046290 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:33:03.046299 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:33:03.046309 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 14:33:03.046321 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:33:03.046559 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:33:03.046661 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:33:03.046676 kernel: acpiphp: Slot [3] registered Dec 13 14:33:03.046686 kernel: acpiphp: Slot [4] registered Dec 13 14:33:03.046695 kernel: acpiphp: Slot [5] registered Dec 13 14:33:03.046705 kernel: acpiphp: Slot [6] registered Dec 13 14:33:03.046718 kernel: acpiphp: Slot [7] registered Dec 13 14:33:03.046728 kernel: acpiphp: Slot [8] registered Dec 13 14:33:03.046737 kernel: acpiphp: Slot [9] registered Dec 13 14:33:03.046747 kernel: acpiphp: Slot [10] registered Dec 13 14:33:03.046756 kernel: acpiphp: Slot [11] registered Dec 13 14:33:03.046765 kernel: acpiphp: Slot [12] registered Dec 13 14:33:03.046775 kernel: acpiphp: Slot [13] registered Dec 13 14:33:03.046784 kernel: acpiphp: Slot [14] registered Dec 13 14:33:03.046793 kernel: acpiphp: Slot [15] registered Dec 13 14:33:03.046804 kernel: acpiphp: Slot [16] registered Dec 13 14:33:03.046814 kernel: acpiphp: Slot [17] registered Dec 13 14:33:03.046823 kernel: acpiphp: Slot [18] registered Dec 13 14:33:03.046832 kernel: acpiphp: Slot [19] registered Dec 13 14:33:03.046842 kernel: acpiphp: Slot [20] registered Dec 13 14:33:03.046851 kernel: acpiphp: Slot [21] registered Dec 13 14:33:03.046860 kernel: acpiphp: Slot [22] registered Dec 13 14:33:03.046870 kernel: acpiphp: Slot [23] registered Dec 13 14:33:03.046879 kernel: acpiphp: Slot [24] registered Dec 13 14:33:03.046888 kernel: acpiphp: Slot [25] registered Dec 13 14:33:03.046899 kernel: acpiphp: Slot [26] registered Dec 13 14:33:03.046909 kernel: acpiphp: Slot [27] registered Dec 13 14:33:03.046918 kernel: acpiphp: Slot [28] registered Dec 13 14:33:03.046927 kernel: acpiphp: Slot [29] registered Dec 13 14:33:03.046937 kernel: acpiphp: Slot [30] registered Dec 13 14:33:03.046946 kernel: acpiphp: Slot [31] registered Dec 13 14:33:03.046955 kernel: PCI host bridge to bus 0000:00 Dec 13 14:33:03.047068 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:33:03.047156 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:33:03.047246 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:33:03.047331 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:33:03.051481 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 14:33:03.051569 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:33:03.051679 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:33:03.051782 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:33:03.051893 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 14:33:03.051989 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 14:33:03.052101 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:33:03.052197 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:33:03.052292 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:33:03.053437 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:33:03.053545 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:33:03.053661 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 14:33:03.053757 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 14:33:03.053859 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 14:33:03.053954 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 14:33:03.054053 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 14:33:03.054149 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 14:33:03.054248 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 14:33:03.054377 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:33:03.054501 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:33:03.054601 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 14:33:03.054695 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 14:33:03.054790 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 14:33:03.054885 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 14:33:03.055000 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:33:03.055098 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:33:03.055207 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 14:33:03.055303 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 14:33:03.059588 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 14:33:03.059703 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 14:33:03.059800 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 14:33:03.059918 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:33:03.060016 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 14:33:03.060113 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 14:33:03.060127 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:33:03.060138 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:33:03.060148 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:33:03.060158 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:33:03.060167 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:33:03.060184 kernel: iommu: Default domain type: Translated Dec 13 14:33:03.060194 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:33:03.060301 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 14:33:03.060417 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:33:03.060545 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 14:33:03.060562 kernel: vgaarb: loaded Dec 13 14:33:03.060572 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:33:03.060582 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:33:03.060592 kernel: PTP clock support registered Dec 13 14:33:03.060605 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:33:03.060615 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:33:03.060625 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:33:03.060634 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 14:33:03.060644 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:33:03.060653 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:33:03.060663 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:33:03.060672 kernel: pnp: PnP ACPI init Dec 13 14:33:03.060770 kernel: pnp 00:03: [dma 2] Dec 13 14:33:03.060789 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:33:03.060800 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:33:03.060809 kernel: NET: Registered PF_INET protocol family Dec 13 14:33:03.060819 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:33:03.060830 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:33:03.060839 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:33:03.060849 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:33:03.060859 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:33:03.060871 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:33:03.060881 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:33:03.060890 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:33:03.060900 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:33:03.060910 kernel: NET: Registered PF_XDP protocol family Dec 13 14:33:03.060995 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:33:03.061081 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:33:03.061165 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:33:03.061253 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:33:03.061336 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 14:33:03.061454 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 14:33:03.061552 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:33:03.061647 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:33:03.061662 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:33:03.061672 kernel: Initialise system trusted keyrings Dec 13 14:33:03.061682 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:33:03.061699 kernel: Key type asymmetric registered Dec 13 14:33:03.061709 kernel: Asymmetric key parser 'x509' registered Dec 13 14:33:03.061719 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:33:03.061728 kernel: io scheduler mq-deadline registered Dec 13 14:33:03.061738 kernel: io scheduler kyber registered Dec 13 14:33:03.061747 kernel: io scheduler bfq registered Dec 13 14:33:03.061757 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:33:03.061767 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 14:33:03.061777 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:33:03.061790 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:33:03.061800 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:33:03.061810 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:33:03.061819 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:33:03.061829 kernel: random: crng init done Dec 13 14:33:03.061838 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:33:03.061848 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:33:03.061858 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:33:03.061977 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:33:03.061998 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:33:03.062083 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:33:03.062167 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:33:02 UTC (1734100382) Dec 13 14:33:03.062252 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 14:33:03.062266 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:33:03.062276 kernel: Segment Routing with IPv6 Dec 13 14:33:03.062285 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:33:03.062295 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:33:03.062310 kernel: Key type dns_resolver registered Dec 13 14:33:03.062319 kernel: IPI shorthand broadcast: enabled Dec 13 14:33:03.062329 kernel: sched_clock: Marking stable (730051437, 121652396)->(875886925, -24183092) Dec 13 14:33:03.062353 kernel: registered taskstats version 1 Dec 13 14:33:03.062364 kernel: Loading compiled-in X.509 certificates Dec 13 14:33:03.062374 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:33:03.062384 kernel: Key type .fscrypt registered Dec 13 14:33:03.062393 kernel: Key type fscrypt-provisioning registered Dec 13 14:33:03.062403 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:33:03.062415 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:33:03.062425 kernel: ima: No architecture policies found Dec 13 14:33:03.062434 kernel: clk: Disabling unused clocks Dec 13 14:33:03.062444 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:33:03.062453 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:33:03.062463 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:33:03.062512 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:33:03.062522 kernel: Run /init as init process Dec 13 14:33:03.062532 kernel: with arguments: Dec 13 14:33:03.062544 kernel: /init Dec 13 14:33:03.062553 kernel: with environment: Dec 13 14:33:03.062562 kernel: HOME=/ Dec 13 14:33:03.062573 kernel: TERM=linux Dec 13 14:33:03.062582 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:33:03.062595 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:33:03.062608 systemd[1]: Detected virtualization kvm. Dec 13 14:33:03.062621 systemd[1]: Detected architecture x86-64. Dec 13 14:33:03.062632 systemd[1]: Running in initrd. Dec 13 14:33:03.062642 systemd[1]: No hostname configured, using default hostname. Dec 13 14:33:03.062652 systemd[1]: Hostname set to . Dec 13 14:33:03.062663 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:33:03.062674 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:33:03.062684 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:33:03.062694 systemd[1]: Reached target cryptsetup.target. Dec 13 14:33:03.062704 systemd[1]: Reached target paths.target. Dec 13 14:33:03.062717 systemd[1]: Reached target slices.target. Dec 13 14:33:03.062727 systemd[1]: Reached target swap.target. Dec 13 14:33:03.062737 systemd[1]: Reached target timers.target. Dec 13 14:33:03.062749 systemd[1]: Listening on iscsid.socket. Dec 13 14:33:03.062759 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:33:03.062770 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:33:03.062780 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:33:03.062794 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:33:03.062805 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:33:03.062816 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:33:03.062826 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:33:03.062837 systemd[1]: Reached target sockets.target. Dec 13 14:33:03.062861 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:33:03.062875 systemd[1]: Finished network-cleanup.service. Dec 13 14:33:03.062888 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:33:03.062898 systemd[1]: Starting systemd-journald.service... Dec 13 14:33:03.062909 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:33:03.062919 systemd[1]: Starting systemd-resolved.service... Dec 13 14:33:03.062930 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:33:03.062940 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:33:03.062951 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:33:03.062965 systemd-journald[185]: Journal started Dec 13 14:33:03.063028 systemd-journald[185]: Runtime Journal (/run/log/journal/7927cfa4c67046ec8657cdb624ed73e3) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:33:03.021381 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:33:03.075922 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:33:03.089793 systemd[1]: Started systemd-journald.service. Dec 13 14:33:03.089828 kernel: audit: type=1130 audit(1734100383.083:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.075931 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:33:03.075971 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:33:03.101713 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:33:03.101739 kernel: audit: type=1130 audit(1734100383.095:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.079069 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:33:03.096045 systemd[1]: Started systemd-resolved.service. Dec 13 14:33:03.104250 kernel: Bridge firewalling registered Dec 13 14:33:03.096734 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:33:03.097442 systemd[1]: Reached target nss-lookup.target. Dec 13 14:33:03.121946 kernel: audit: type=1130 audit(1734100383.096:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.121978 kernel: audit: type=1130 audit(1734100383.096:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.102315 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:33:03.102959 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:33:03.130581 kernel: audit: type=1130 audit(1734100383.125:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.104744 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:33:03.122771 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:33:03.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.133957 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:33:03.138391 kernel: audit: type=1130 audit(1734100383.134:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.138961 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:33:03.140980 kernel: SCSI subsystem initialized Dec 13 14:33:03.150267 dracut-cmdline[201]: dracut-dracut-053 Dec 13 14:33:03.152802 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:33:03.158359 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:33:03.158385 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:33:03.160360 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:33:03.163372 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:33:03.164193 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:33:03.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.165792 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:33:03.169636 kernel: audit: type=1130 audit(1734100383.164:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.175980 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:33:03.180609 kernel: audit: type=1130 audit(1734100383.176:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.222375 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:33:03.243381 kernel: iscsi: registered transport (tcp) Dec 13 14:33:03.270425 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:33:03.270504 kernel: QLogic iSCSI HBA Driver Dec 13 14:33:03.319640 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:33:03.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.329610 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:33:03.330432 kernel: audit: type=1130 audit(1734100383.320:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.437475 kernel: raid6: sse2x4 gen() 5503 MB/s Dec 13 14:33:03.454424 kernel: raid6: sse2x4 xor() 4951 MB/s Dec 13 14:33:03.471457 kernel: raid6: sse2x2 gen() 13382 MB/s Dec 13 14:33:03.488569 kernel: raid6: sse2x2 xor() 8312 MB/s Dec 13 14:33:03.505440 kernel: raid6: sse2x1 gen() 10583 MB/s Dec 13 14:33:03.523160 kernel: raid6: sse2x1 xor() 6770 MB/s Dec 13 14:33:03.523242 kernel: raid6: using algorithm sse2x2 gen() 13382 MB/s Dec 13 14:33:03.523283 kernel: raid6: .... xor() 8312 MB/s, rmw enabled Dec 13 14:33:03.524042 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 14:33:03.539938 kernel: xor: measuring software checksum speed Dec 13 14:33:03.539998 kernel: prefetch64-sse : 18347 MB/sec Dec 13 14:33:03.541139 kernel: generic_sse : 15372 MB/sec Dec 13 14:33:03.541196 kernel: xor: using function: prefetch64-sse (18347 MB/sec) Dec 13 14:33:03.659406 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:33:03.675541 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:33:03.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.676000 audit: BPF prog-id=7 op=LOAD Dec 13 14:33:03.676000 audit: BPF prog-id=8 op=LOAD Dec 13 14:33:03.677155 systemd[1]: Starting systemd-udevd.service... Dec 13 14:33:03.713561 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 14:33:03.725451 systemd[1]: Started systemd-udevd.service. Dec 13 14:33:03.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.735128 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:33:03.761115 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Dec 13 14:33:03.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.803506 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:33:03.806390 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:33:03.844610 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:33:03.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:03.907412 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 14:33:04.092682 kernel: libata version 3.00 loaded. Dec 13 14:33:04.092735 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 14:33:04.093017 kernel: scsi host0: ata_piix Dec 13 14:33:04.093301 kernel: scsi host1: ata_piix Dec 13 14:33:04.093593 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 14:33:04.093624 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 14:33:04.093669 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:33:04.093695 kernel: GPT:17805311 != 41943039 Dec 13 14:33:04.093718 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:33:04.093742 kernel: GPT:17805311 != 41943039 Dec 13 14:33:04.093765 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:33:04.093790 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:33:04.404431 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (438) Dec 13 14:33:04.428116 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:33:04.636485 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:33:04.646583 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:33:04.719879 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:33:04.721267 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:33:04.725732 systemd[1]: Starting disk-uuid.service... Dec 13 14:33:05.334849 disk-uuid[460]: Primary Header is updated. Dec 13 14:33:05.334849 disk-uuid[460]: Secondary Entries is updated. Dec 13 14:33:05.334849 disk-uuid[460]: Secondary Header is updated. Dec 13 14:33:05.448610 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:33:05.838415 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:33:06.885388 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:33:06.886879 disk-uuid[461]: The operation has completed successfully. Dec 13 14:33:06.972213 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:33:06.972468 systemd[1]: Finished disk-uuid.service. Dec 13 14:33:06.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:06.992072 systemd[1]: Starting verity-setup.service... Dec 13 14:33:07.012016 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 14:33:07.117158 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:33:07.120075 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:33:07.122590 systemd[1]: Finished verity-setup.service. Dec 13 14:33:07.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.128658 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 14:33:07.128774 kernel: audit: type=1130 audit(1734100387.125:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.257371 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:33:07.258020 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:33:07.259128 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:33:07.260733 systemd[1]: Starting ignition-setup.service... Dec 13 14:33:07.262372 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:33:07.284277 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:33:07.284375 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:33:07.284390 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:33:07.305578 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:33:07.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.319297 systemd[1]: Finished ignition-setup.service. Dec 13 14:33:07.328580 kernel: audit: type=1130 audit(1734100387.319:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.320647 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:33:07.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.413689 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:33:07.418515 kernel: audit: type=1130 audit(1734100387.413:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.418000 audit: BPF prog-id=9 op=LOAD Dec 13 14:33:07.419040 systemd[1]: Starting systemd-networkd.service... Dec 13 14:33:07.421367 kernel: audit: type=1334 audit(1734100387.418:22): prog-id=9 op=LOAD Dec 13 14:33:07.447471 systemd-networkd[631]: lo: Link UP Dec 13 14:33:07.448281 systemd-networkd[631]: lo: Gained carrier Dec 13 14:33:07.449122 systemd-networkd[631]: Enumeration completed Dec 13 14:33:07.456710 kernel: audit: type=1130 audit(1734100387.449:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.449218 systemd[1]: Started systemd-networkd.service. Dec 13 14:33:07.449977 systemd[1]: Reached target network.target. Dec 13 14:33:07.455629 systemd-networkd[631]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:33:07.459621 systemd-networkd[631]: eth0: Link UP Dec 13 14:33:07.459626 systemd-networkd[631]: eth0: Gained carrier Dec 13 14:33:07.461284 systemd[1]: Starting iscsiuio.service... Dec 13 14:33:07.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.484387 systemd[1]: Started iscsiuio.service. Dec 13 14:33:07.484500 systemd-networkd[631]: eth0: DHCPv4 address 172.24.4.233/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:33:07.491145 kernel: audit: type=1130 audit(1734100387.484:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.491167 iscsid[640]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:33:07.491167 iscsid[640]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:33:07.491167 iscsid[640]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:33:07.491167 iscsid[640]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:33:07.491167 iscsid[640]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:33:07.491167 iscsid[640]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:33:07.491167 iscsid[640]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:33:07.503779 kernel: audit: type=1130 audit(1734100387.495:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.485989 systemd[1]: Starting iscsid.service... Dec 13 14:33:07.494165 systemd[1]: Started iscsid.service. Dec 13 14:33:07.496800 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:33:07.513406 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:33:07.518133 kernel: audit: type=1130 audit(1734100387.513:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.513977 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:33:07.518589 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:33:07.519554 systemd[1]: Reached target remote-fs.target. Dec 13 14:33:07.522047 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:33:07.532441 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:33:07.537591 kernel: audit: type=1130 audit(1734100387.532:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.686692 ignition[563]: Ignition 2.14.0 Dec 13 14:33:07.688495 ignition[563]: Stage: fetch-offline Dec 13 14:33:07.688680 ignition[563]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:07.688721 ignition[563]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:07.690796 ignition[563]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:07.691022 ignition[563]: parsed url from cmdline: "" Dec 13 14:33:07.691032 ignition[563]: no config URL provided Dec 13 14:33:07.693602 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:33:07.705541 kernel: audit: type=1130 audit(1734100387.694:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.691045 ignition[563]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:33:07.696571 systemd[1]: Starting ignition-fetch.service... Dec 13 14:33:07.691064 ignition[563]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:33:07.691078 ignition[563]: failed to fetch config: resource requires networking Dec 13 14:33:07.691291 ignition[563]: Ignition finished successfully Dec 13 14:33:07.730700 ignition[655]: Ignition 2.14.0 Dec 13 14:33:07.730716 ignition[655]: Stage: fetch Dec 13 14:33:07.730958 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:07.730999 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:07.733540 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:07.733768 ignition[655]: parsed url from cmdline: "" Dec 13 14:33:07.733778 ignition[655]: no config URL provided Dec 13 14:33:07.733791 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:33:07.733811 ignition[655]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:33:07.740128 ignition[655]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 14:33:07.740179 ignition[655]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 14:33:07.742072 ignition[655]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 14:33:07.949829 ignition[655]: GET result: OK Dec 13 14:33:07.949930 ignition[655]: parsing config with SHA512: f61d56f2ec75e3df5e0af1e80580bbb23b95ee4ee4c470990c104d04aad1128e25f8d7f3508ea497c10dfdb4f73944d9ff2a110e6a1e88622d4938deaca85d15 Dec 13 14:33:07.965662 unknown[655]: fetched base config from "system" Dec 13 14:33:07.965688 unknown[655]: fetched base config from "system" Dec 13 14:33:07.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.966532 ignition[655]: fetch: fetch complete Dec 13 14:33:07.965703 unknown[655]: fetched user config from "openstack" Dec 13 14:33:07.966547 ignition[655]: fetch: fetch passed Dec 13 14:33:07.969585 systemd[1]: Finished ignition-fetch.service. Dec 13 14:33:07.966698 ignition[655]: Ignition finished successfully Dec 13 14:33:07.972677 systemd[1]: Starting ignition-kargs.service... Dec 13 14:33:07.993756 ignition[661]: Ignition 2.14.0 Dec 13 14:33:07.993785 ignition[661]: Stage: kargs Dec 13 14:33:07.994023 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:07.994068 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:07.996269 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:07.998340 ignition[661]: kargs: kargs passed Dec 13 14:33:08.000986 systemd[1]: Finished ignition-kargs.service. Dec 13 14:33:08.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:07.998501 ignition[661]: Ignition finished successfully Dec 13 14:33:08.004452 systemd[1]: Starting ignition-disks.service... Dec 13 14:33:08.023181 ignition[666]: Ignition 2.14.0 Dec 13 14:33:08.023209 ignition[666]: Stage: disks Dec 13 14:33:08.023504 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:08.023548 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:08.025810 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:08.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.029874 systemd[1]: Finished ignition-disks.service. Dec 13 14:33:08.027884 ignition[666]: disks: disks passed Dec 13 14:33:08.031188 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:33:08.027981 ignition[666]: Ignition finished successfully Dec 13 14:33:08.032285 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:33:08.033465 systemd[1]: Reached target local-fs.target. Dec 13 14:33:08.035760 systemd[1]: Reached target sysinit.target. Dec 13 14:33:08.037862 systemd[1]: Reached target basic.target. Dec 13 14:33:08.041857 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:33:08.074842 systemd-fsck[673]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:33:08.088401 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:33:08.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.091498 systemd[1]: Mounting sysroot.mount... Dec 13 14:33:08.108418 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:33:08.110018 systemd[1]: Mounted sysroot.mount. Dec 13 14:33:08.112579 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:33:08.117530 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:33:08.119508 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:33:08.121004 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 14:33:08.126849 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:33:08.127662 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:33:08.134538 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:33:08.139394 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:33:08.153433 initrd-setup-root[684]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:33:08.162934 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:33:08.172900 initrd-setup-root[693]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:33:08.186381 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (691) Dec 13 14:33:08.192231 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:33:08.192267 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:33:08.192280 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:33:08.194112 initrd-setup-root[701]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:33:08.199732 initrd-setup-root[725]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:33:08.212018 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:33:08.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.276995 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:33:08.279193 systemd[1]: Starting ignition-mount.service... Dec 13 14:33:08.282014 systemd[1]: Starting sysroot-boot.service... Dec 13 14:33:08.292263 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:33:08.292405 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:33:08.319118 ignition[747]: INFO : Ignition 2.14.0 Dec 13 14:33:08.319118 ignition[747]: INFO : Stage: mount Dec 13 14:33:08.320373 ignition[747]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:08.320373 ignition[747]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:08.320373 ignition[747]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:08.324820 ignition[747]: INFO : mount: mount passed Dec 13 14:33:08.324820 ignition[747]: INFO : Ignition finished successfully Dec 13 14:33:08.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.324966 systemd[1]: Finished ignition-mount.service. Dec 13 14:33:08.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.331466 systemd[1]: Finished sysroot-boot.service. Dec 13 14:33:08.344717 coreos-metadata[679]: Dec 13 14:33:08.344 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:33:08.362619 coreos-metadata[679]: Dec 13 14:33:08.362 INFO Fetch successful Dec 13 14:33:08.363223 coreos-metadata[679]: Dec 13 14:33:08.363 INFO wrote hostname ci-3510-3-6-7-66d90f3bba.novalocal to /sysroot/etc/hostname Dec 13 14:33:08.366836 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 14:33:08.366999 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 14:33:08.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:08.369171 systemd[1]: Starting ignition-files.service... Dec 13 14:33:08.383327 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:33:08.396402 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (756) Dec 13 14:33:08.401392 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:33:08.401427 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:33:08.401439 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:33:08.411150 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:33:08.422472 ignition[775]: INFO : Ignition 2.14.0 Dec 13 14:33:08.423269 ignition[775]: INFO : Stage: files Dec 13 14:33:08.423988 ignition[775]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:08.424721 ignition[775]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:08.426765 ignition[775]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:08.429421 ignition[775]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:33:08.431126 ignition[775]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:33:08.431975 ignition[775]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:33:08.438095 ignition[775]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:33:08.439144 ignition[775]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:33:08.441336 unknown[775]: wrote ssh authorized keys file for user: core Dec 13 14:33:08.442033 ignition[775]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:33:08.443441 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:33:08.444467 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:33:08.445711 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:33:08.450091 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:33:08.450091 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:33:08.450091 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:33:08.450091 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:33:08.450091 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:33:08.646779 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 14:33:09.149751 systemd-networkd[631]: eth0: Gained IPv6LL Dec 13 14:33:10.331283 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:33:10.331283 ignition[775]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:33:10.331283 ignition[775]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:33:10.331283 ignition[775]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:33:10.348456 ignition[775]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:33:10.375277 ignition[775]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:33:10.379027 ignition[775]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:33:10.379027 ignition[775]: INFO : files: files passed Dec 13 14:33:10.379027 ignition[775]: INFO : Ignition finished successfully Dec 13 14:33:10.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.378911 systemd[1]: Finished ignition-files.service. Dec 13 14:33:10.384728 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:33:10.386078 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:33:10.387707 systemd[1]: Starting ignition-quench.service... Dec 13 14:33:10.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.424068 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:33:10.424270 systemd[1]: Finished ignition-quench.service. Dec 13 14:33:10.442904 initrd-setup-root-after-ignition[800]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:33:10.444568 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:33:10.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.446902 systemd[1]: Reached target ignition-complete.target. Dec 13 14:33:10.450760 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:33:10.480552 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:33:10.480784 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:33:10.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.483426 systemd[1]: Reached target initrd-fs.target. Dec 13 14:33:10.485401 systemd[1]: Reached target initrd.target. Dec 13 14:33:10.487670 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:33:10.489257 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:33:10.516978 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:33:10.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.519973 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:33:10.543321 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:33:10.546192 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:33:10.548900 systemd[1]: Stopped target timers.target. Dec 13 14:33:10.551601 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:33:10.551919 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:33:10.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.554733 systemd[1]: Stopped target initrd.target. Dec 13 14:33:10.556621 systemd[1]: Stopped target basic.target. Dec 13 14:33:10.559014 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:33:10.561308 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:33:10.563757 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:33:10.566040 systemd[1]: Stopped target remote-fs.target. Dec 13 14:33:10.568265 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:33:10.570608 systemd[1]: Stopped target sysinit.target. Dec 13 14:33:10.572739 systemd[1]: Stopped target local-fs.target. Dec 13 14:33:10.574873 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:33:10.577056 systemd[1]: Stopped target swap.target. Dec 13 14:33:10.579155 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:33:10.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.579571 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:33:10.581812 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:33:10.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.583733 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:33:10.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.584078 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:33:10.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.586164 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:33:10.586621 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:33:10.588318 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:33:10.596975 iscsid[640]: iscsid shutting down. Dec 13 14:33:10.588871 systemd[1]: Stopped ignition-files.service. Dec 13 14:33:10.593003 systemd[1]: Stopping ignition-mount.service... Dec 13 14:33:10.602838 systemd[1]: Stopping iscsid.service... Dec 13 14:33:10.604248 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:33:10.604696 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:33:10.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.618650 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:33:10.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.631976 ignition[813]: INFO : Ignition 2.14.0 Dec 13 14:33:10.631976 ignition[813]: INFO : Stage: umount Dec 13 14:33:10.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.619138 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:33:10.636231 ignition[813]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:33:10.636231 ignition[813]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:33:10.636231 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:33:10.636231 ignition[813]: INFO : umount: umount passed Dec 13 14:33:10.636231 ignition[813]: INFO : Ignition finished successfully Dec 13 14:33:10.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.619362 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:33:10.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.619970 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:33:10.620111 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:33:10.623130 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:33:10.623244 systemd[1]: Stopped iscsid.service. Dec 13 14:33:10.625063 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:33:10.625157 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:33:10.627732 systemd[1]: Stopping iscsiuio.service... Dec 13 14:33:10.632183 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:33:10.632286 systemd[1]: Stopped iscsiuio.service. Dec 13 14:33:10.635888 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:33:10.635968 systemd[1]: Stopped ignition-mount.service. Dec 13 14:33:10.636709 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:33:10.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.636750 systemd[1]: Stopped ignition-disks.service. Dec 13 14:33:10.637905 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:33:10.637940 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:33:10.639504 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:33:10.639539 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:33:10.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.640639 systemd[1]: Stopped target network.target. Dec 13 14:33:10.641617 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:33:10.641658 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:33:10.642790 systemd[1]: Stopped target paths.target. Dec 13 14:33:10.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.643811 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:33:10.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.647392 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:33:10.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.648013 systemd[1]: Stopped target slices.target. Dec 13 14:33:10.648897 systemd[1]: Stopped target sockets.target. Dec 13 14:33:10.649981 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:33:10.650013 systemd[1]: Closed iscsid.socket. Dec 13 14:33:10.650847 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:33:10.650878 systemd[1]: Closed iscsiuio.socket. Dec 13 14:33:10.651942 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:33:10.651979 systemd[1]: Stopped ignition-setup.service. Dec 13 14:33:10.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.653222 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:33:10.653947 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:33:10.655397 systemd-networkd[631]: eth0: DHCPv6 lease lost Dec 13 14:33:10.679000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:33:10.656408 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:33:10.680000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:33:10.656492 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:33:10.658444 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:33:10.658493 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:33:10.659896 systemd[1]: Stopping network-cleanup.service... Dec 13 14:33:10.665134 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:33:10.665196 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:33:10.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.666201 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:33:10.666240 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:33:10.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.667640 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:33:10.667681 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:33:10.668428 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:33:10.675699 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:33:10.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.676201 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:33:10.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.676304 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:33:10.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.682674 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:33:10.682844 systemd[1]: Stopped network-cleanup.service. Dec 13 14:33:10.684981 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:33:10.685162 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:33:10.686518 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:33:10.686558 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:33:10.687661 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:33:10.687692 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:33:10.688626 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:33:10.688668 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:33:10.689597 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:33:10.689635 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:33:10.690811 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:33:10.690863 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:33:10.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.692733 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:33:10.699222 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:33:10.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.699288 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:33:10.700748 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:33:10.700873 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:33:10.839992 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:33:10.937436 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:33:10.937682 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:33:10.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.940410 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:33:10.942317 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:33:10.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:10.942500 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:33:10.945900 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:33:10.989290 systemd[1]: Switching root. Dec 13 14:33:11.022636 systemd-journald[185]: Journal stopped Dec 13 14:33:19.967516 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 13 14:33:19.967570 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:33:19.967588 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:33:19.967601 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:33:19.967612 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:33:19.967624 kernel: SELinux: policy capability open_perms=1 Dec 13 14:33:19.967639 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:33:19.967656 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:33:19.967667 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:33:19.967678 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:33:19.967689 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:33:19.967699 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:33:19.967710 systemd[1]: Successfully loaded SELinux policy in 91.364ms. Dec 13 14:33:19.967731 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.924ms. Dec 13 14:33:19.967745 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:33:19.967759 systemd[1]: Detected virtualization kvm. Dec 13 14:33:19.967771 systemd[1]: Detected architecture x86-64. Dec 13 14:33:19.967782 systemd[1]: Detected first boot. Dec 13 14:33:19.967794 systemd[1]: Hostname set to . Dec 13 14:33:19.967806 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:33:19.967817 kernel: kauditd_printk_skb: 52 callbacks suppressed Dec 13 14:33:19.967832 kernel: audit: type=1400 audit(1734100392.146:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:33:19.967844 kernel: audit: type=1400 audit(1734100392.149:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:33:19.967857 kernel: audit: type=1334 audit(1734100392.150:83): prog-id=10 op=LOAD Dec 13 14:33:19.967868 kernel: audit: type=1334 audit(1734100392.150:84): prog-id=10 op=UNLOAD Dec 13 14:33:19.967878 kernel: audit: type=1334 audit(1734100392.161:85): prog-id=11 op=LOAD Dec 13 14:33:19.967889 kernel: audit: type=1334 audit(1734100392.161:86): prog-id=11 op=UNLOAD Dec 13 14:33:19.967900 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:33:19.967915 kernel: audit: type=1400 audit(1734100392.327:87): avc: denied { associate } for pid=845 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:33:19.967929 kernel: audit: type=1300 audit(1734100392.327:87): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=828 pid=845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:19.967942 kernel: audit: type=1327 audit(1734100392.327:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:33:19.967954 kernel: audit: type=1400 audit(1734100392.332:88): avc: denied { associate } for pid=845 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:33:19.967965 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:33:19.967977 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:19.967990 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:19.968003 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:19.968020 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 14:33:19.968031 kernel: audit: type=1334 audit(1734100399.666:89): prog-id=12 op=LOAD Dec 13 14:33:19.968041 kernel: audit: type=1334 audit(1734100399.666:90): prog-id=3 op=UNLOAD Dec 13 14:33:19.968051 kernel: audit: type=1334 audit(1734100399.668:91): prog-id=13 op=LOAD Dec 13 14:33:19.968062 kernel: audit: type=1334 audit(1734100399.671:92): prog-id=14 op=LOAD Dec 13 14:33:19.968072 kernel: audit: type=1334 audit(1734100399.671:93): prog-id=4 op=UNLOAD Dec 13 14:33:19.968085 kernel: audit: type=1334 audit(1734100399.671:94): prog-id=5 op=UNLOAD Dec 13 14:33:19.968095 kernel: audit: type=1334 audit(1734100399.674:95): prog-id=15 op=LOAD Dec 13 14:33:19.968106 kernel: audit: type=1334 audit(1734100399.674:96): prog-id=12 op=UNLOAD Dec 13 14:33:19.968117 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:33:19.968130 kernel: audit: type=1334 audit(1734100399.677:97): prog-id=16 op=LOAD Dec 13 14:33:19.968141 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:33:19.968152 kernel: audit: type=1334 audit(1734100399.679:98): prog-id=17 op=LOAD Dec 13 14:33:19.968163 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:33:19.968175 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:33:19.968189 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:33:19.968203 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:33:19.968215 systemd[1]: Created slice system-getty.slice. Dec 13 14:33:19.968226 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:33:19.968238 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:33:19.968252 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:33:19.968264 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:33:19.968275 systemd[1]: Created slice user.slice. Dec 13 14:33:19.968287 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:33:19.968298 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:33:19.968310 systemd[1]: Set up automount boot.automount. Dec 13 14:33:19.968321 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:33:19.968332 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:33:19.968362 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:33:19.968377 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:33:19.968389 systemd[1]: Reached target integritysetup.target. Dec 13 14:33:19.968402 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:33:19.968413 systemd[1]: Reached target remote-fs.target. Dec 13 14:33:19.968425 systemd[1]: Reached target slices.target. Dec 13 14:33:19.968437 systemd[1]: Reached target swap.target. Dec 13 14:33:19.968448 systemd[1]: Reached target torcx.target. Dec 13 14:33:19.968459 systemd[1]: Reached target veritysetup.target. Dec 13 14:33:19.968471 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:33:19.968482 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:33:19.968496 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:33:19.968507 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:33:19.968519 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:33:19.968531 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:33:19.968542 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:33:19.968555 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:33:19.968566 systemd[1]: Mounting media.mount... Dec 13 14:33:19.968577 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:19.968589 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:33:19.968603 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:33:19.968614 systemd[1]: Mounting tmp.mount... Dec 13 14:33:19.968626 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:33:19.968638 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:19.968651 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:33:19.968662 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:33:19.968673 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:19.968685 systemd[1]: Starting modprobe@drm.service... Dec 13 14:33:19.968697 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:19.968711 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:33:19.968722 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:19.968735 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:33:19.968747 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:33:19.968759 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:33:19.968770 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:33:19.968781 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:33:19.968793 systemd[1]: Stopped systemd-journald.service. Dec 13 14:33:19.968804 systemd[1]: Starting systemd-journald.service... Dec 13 14:33:19.968818 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:33:19.968830 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:33:19.968841 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:33:19.968853 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:33:19.968865 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:33:19.968876 kernel: loop: module loaded Dec 13 14:33:19.968887 systemd[1]: Stopped verity-setup.service. Dec 13 14:33:19.968901 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:19.968912 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:33:19.968926 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:33:19.968938 systemd[1]: Mounted media.mount. Dec 13 14:33:19.968949 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:33:19.968961 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:33:19.968972 systemd[1]: Mounted tmp.mount. Dec 13 14:33:19.968983 kernel: fuse: init (API version 7.34) Dec 13 14:33:19.968995 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:33:19.969009 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:33:19.969021 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:33:19.969032 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:19.969046 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:19.969058 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:33:19.969070 systemd[1]: Finished modprobe@drm.service. Dec 13 14:33:19.969081 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:19.969093 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:19.969107 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:33:19.969119 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:33:19.969130 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:19.969142 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:19.969156 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:33:19.969167 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:33:19.969179 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:33:19.969191 systemd[1]: Reached target network-pre.target. Dec 13 14:33:19.969203 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:33:19.969216 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:33:19.969228 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:33:19.969243 systemd-journald[914]: Journal started Dec 13 14:33:19.969284 systemd-journald[914]: Runtime Journal (/run/log/journal/7927cfa4c67046ec8657cdb624ed73e3) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:33:12.020000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:33:12.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:33:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:33:12.150000 audit: BPF prog-id=10 op=LOAD Dec 13 14:33:12.150000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:33:12.161000 audit: BPF prog-id=11 op=LOAD Dec 13 14:33:12.161000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:33:12.327000 audit[845]: AVC avc: denied { associate } for pid=845 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:33:12.327000 audit[845]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=828 pid=845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:12.327000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:33:12.332000 audit[845]: AVC avc: denied { associate } for pid=845 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:33:12.332000 audit[845]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=828 pid=845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:12.332000 audit: CWD cwd="/" Dec 13 14:33:12.332000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:12.332000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:12.332000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:33:19.666000 audit: BPF prog-id=12 op=LOAD Dec 13 14:33:19.666000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:33:19.668000 audit: BPF prog-id=13 op=LOAD Dec 13 14:33:19.671000 audit: BPF prog-id=14 op=LOAD Dec 13 14:33:19.671000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:33:19.671000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:33:19.674000 audit: BPF prog-id=15 op=LOAD Dec 13 14:33:19.674000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:33:19.677000 audit: BPF prog-id=16 op=LOAD Dec 13 14:33:19.679000 audit: BPF prog-id=17 op=LOAD Dec 13 14:33:19.679000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:33:19.679000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:33:19.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.976715 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:33:19.976761 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:33:19.699000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:33:19.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.850000 audit: BPF prog-id=18 op=LOAD Dec 13 14:33:19.850000 audit: BPF prog-id=19 op=LOAD Dec 13 14:33:19.850000 audit: BPF prog-id=20 op=LOAD Dec 13 14:33:19.851000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:33:19.851000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:33:19.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.965000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:33:19.965000 audit[914]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff6f5e6e90 a2=4000 a3=7fff6f5e6f2c items=0 ppid=1 pid=914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:19.965000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:33:19.664771 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:33:19.985087 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:33:19.985116 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:33:19.985135 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:33:12.325049 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:19.664785 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:33:12.325862 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:33:19.681047 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:33:12.325887 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:33:12.325956 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:33:12.325969 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:33:12.326004 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:33:12.326020 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:33:12.326263 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:33:12.326310 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:33:12.326326 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:33:12.327261 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:33:12.327301 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:33:12.327323 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:33:12.327364 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:33:12.327387 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:33:12.327404 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:33:18.783566 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:18Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:18.784608 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:18Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:18.784896 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:18Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:18.785407 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:18Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:33:18.785556 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:18Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:33:20.003169 systemd[1]: Started systemd-journald.service. Dec 13 14:33:19.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:18.785718 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-12-13T14:33:18Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:33:19.998021 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:33:19.998652 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:33:20.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:20.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:20.019887 systemd-journald[914]: Time spent on flushing to /var/log/journal/7927cfa4c67046ec8657cdb624ed73e3 is 26.667ms for 1101 entries. Dec 13 14:33:20.019887 systemd-journald[914]: System Journal (/var/log/journal/7927cfa4c67046ec8657cdb624ed73e3) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:33:20.100551 systemd-journald[914]: Received client request to flush runtime journal. Dec 13 14:33:20.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:20.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:19.999527 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:33:20.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:20.001332 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:33:20.103221 udevadm[951]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:33:20.003707 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:33:20.004710 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:33:20.005261 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:33:20.012096 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:33:20.013908 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:33:20.049396 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:33:20.062919 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:33:20.101833 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:33:21.176133 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:33:21.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:21.178000 audit: BPF prog-id=21 op=LOAD Dec 13 14:33:21.179000 audit: BPF prog-id=22 op=LOAD Dec 13 14:33:21.179000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:33:21.179000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:33:21.181518 systemd[1]: Starting systemd-udevd.service... Dec 13 14:33:21.224771 systemd-udevd[956]: Using default interface naming scheme 'v252'. Dec 13 14:33:22.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.131658 systemd[1]: Started systemd-udevd.service. Dec 13 14:33:22.138000 audit: BPF prog-id=23 op=LOAD Dec 13 14:33:22.140817 systemd[1]: Starting systemd-networkd.service... Dec 13 14:33:22.187711 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:33:22.225000 audit: BPF prog-id=24 op=LOAD Dec 13 14:33:22.227000 audit: BPF prog-id=25 op=LOAD Dec 13 14:33:22.227000 audit: BPF prog-id=26 op=LOAD Dec 13 14:33:22.230004 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:33:22.270373 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:33:22.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.281622 systemd[1]: Started systemd-userdbd.service. Dec 13 14:33:22.285375 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:33:22.301059 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:33:22.339000 audit[967]: AVC avc: denied { confidentiality } for pid=967 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:33:22.339000 audit[967]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55897fa5ad50 a1=337fc a2=7f675bfe1bc5 a3=5 items=110 ppid=956 pid=967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:22.339000 audit: CWD cwd="/" Dec 13 14:33:22.339000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=1 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=2 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=3 name=(null) inode=14569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=4 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=5 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=6 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=7 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=8 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=9 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=10 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=11 name=(null) inode=14573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=12 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=13 name=(null) inode=14574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=14 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=15 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=16 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=17 name=(null) inode=14576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=18 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=19 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=20 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=21 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=22 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=23 name=(null) inode=14579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=24 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=25 name=(null) inode=14580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=26 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=27 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=28 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=29 name=(null) inode=14582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=30 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=31 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=32 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=33 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=34 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=35 name=(null) inode=14585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=36 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=37 name=(null) inode=14586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=38 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=39 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=40 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=41 name=(null) inode=14588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=42 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=43 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=44 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=45 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=46 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=47 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=48 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=49 name=(null) inode=14592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=50 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=51 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=52 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=53 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=55 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=56 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=57 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=58 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=59 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=60 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=61 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=62 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=63 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=64 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=65 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=66 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=67 name=(null) inode=14601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=68 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=69 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=70 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=71 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=72 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=73 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=74 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=75 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=76 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=77 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=78 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=79 name=(null) inode=14607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=80 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=81 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=82 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=83 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=84 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=85 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=86 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=87 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=88 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=89 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=90 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=91 name=(null) inode=14613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=92 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=93 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=94 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=95 name=(null) inode=14615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=96 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=97 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=98 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=99 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=100 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=101 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=102 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=103 name=(null) inode=14619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=104 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=105 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=106 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=107 name=(null) inode=14621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PATH item=109 name=(null) inode=14622 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:22.339000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:33:22.364378 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 14:33:22.380392 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:33:22.393373 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:33:22.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.426831 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:33:22.428699 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:33:22.648998 lvm[985]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:33:22.712193 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:33:22.713661 systemd[1]: Reached target cryptsetup.target. Dec 13 14:33:22.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.717172 systemd[1]: Starting lvm2-activation.service... Dec 13 14:33:22.726792 lvm[986]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:33:22.780464 systemd[1]: Finished lvm2-activation.service. Dec 13 14:33:22.781877 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:33:22.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.783042 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:33:22.783108 systemd[1]: Reached target local-fs.target. Dec 13 14:33:22.784175 systemd[1]: Reached target machines.target. Dec 13 14:33:22.788244 systemd[1]: Starting ldconfig.service... Dec 13 14:33:22.829478 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:22.829601 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:22.832100 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:33:22.835399 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:33:22.839197 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:33:22.842927 systemd[1]: Starting systemd-sysext.service... Dec 13 14:33:22.940572 systemd[1]: boot.automount: Got automount request for /boot, triggered by 988 (bootctl) Dec 13 14:33:22.943599 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:33:22.947502 systemd-networkd[968]: lo: Link UP Dec 13 14:33:22.947525 systemd-networkd[968]: lo: Gained carrier Dec 13 14:33:22.948820 systemd-networkd[968]: Enumeration completed Dec 13 14:33:22.949042 systemd[1]: Started systemd-networkd.service. Dec 13 14:33:22.949735 systemd-networkd[968]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:33:22.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.975628 systemd-networkd[968]: eth0: Link UP Dec 13 14:33:22.975648 systemd-networkd[968]: eth0: Gained carrier Dec 13 14:33:22.987271 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:33:22.991773 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:33:22.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:22.996622 systemd-networkd[968]: eth0: DHCPv4 address 172.24.4.233/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:33:23.033882 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:33:23.034280 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:33:23.451435 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:33:24.317738 systemd-networkd[968]: eth0: Gained IPv6LL Dec 13 14:33:24.848934 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:33:24.852167 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:33:24.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:24.856152 kernel: kauditd_printk_skb: 172 callbacks suppressed Dec 13 14:33:24.856547 kernel: audit: type=1130 audit(1734100404.853:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:24.890451 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:33:24.931405 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:33:25.002620 (sd-sysext)[1002]: Using extensions 'kubernetes'. Dec 13 14:33:25.003691 (sd-sysext)[1002]: Merged extensions into '/usr'. Dec 13 14:33:25.036469 systemd-fsck[999]: fsck.fat 4.2 (2021-01-31) Dec 13 14:33:25.036469 systemd-fsck[999]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:33:25.060451 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:33:25.073436 kernel: audit: type=1130 audit(1734100405.062:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.077985 systemd[1]: Mounting boot.mount... Dec 13 14:33:25.079768 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:25.087885 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:33:25.090504 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:25.093647 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:25.097092 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:25.100100 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:25.101688 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:25.101873 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:25.102017 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:25.105245 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:33:25.106963 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:25.107129 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:25.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.112128 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:25.112268 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:25.112402 kernel: audit: type=1130 audit(1734100405.107:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.112452 kernel: audit: type=1131 audit(1734100405.111:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.117378 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:25.117500 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:25.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.125242 kernel: audit: type=1130 audit(1734100405.116:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.125501 kernel: audit: type=1131 audit(1734100405.116:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.128551 systemd[1]: Mounted boot.mount. Dec 13 14:33:25.132545 kernel: audit: type=1130 audit(1734100405.125:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.132693 kernel: audit: type=1131 audit(1734100405.125:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.139140 systemd[1]: Finished systemd-sysext.service. Dec 13 14:33:25.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.142152 systemd[1]: Starting ensure-sysext.service... Dec 13 14:33:25.143377 kernel: audit: type=1130 audit(1734100405.139:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.153008 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:33:25.153082 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:33:25.155757 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:33:25.162096 systemd[1]: Reloading. Dec 13 14:33:25.226139 systemd-tmpfiles[1010]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:33:25.246516 systemd-tmpfiles[1010]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:33:25.250519 /usr/lib/systemd/system-generators/torcx-generator[1030]: time="2024-12-13T14:33:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:25.251145 /usr/lib/systemd/system-generators/torcx-generator[1030]: time="2024-12-13T14:33:25Z" level=info msg="torcx already run" Dec 13 14:33:25.271224 systemd-tmpfiles[1010]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:33:25.419441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:25.419489 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:25.456640 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:25.515000 audit: BPF prog-id=27 op=LOAD Dec 13 14:33:25.517000 audit: BPF prog-id=28 op=LOAD Dec 13 14:33:25.517000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:33:25.517000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:33:25.518367 kernel: audit: type=1334 audit(1734100405.515:165): prog-id=27 op=LOAD Dec 13 14:33:25.521000 audit: BPF prog-id=29 op=LOAD Dec 13 14:33:25.522000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:33:25.523000 audit: BPF prog-id=30 op=LOAD Dec 13 14:33:25.523000 audit: BPF prog-id=31 op=LOAD Dec 13 14:33:25.523000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:33:25.523000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:33:25.525000 audit: BPF prog-id=32 op=LOAD Dec 13 14:33:25.525000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:33:25.532000 audit: BPF prog-id=33 op=LOAD Dec 13 14:33:25.532000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:33:25.532000 audit: BPF prog-id=34 op=LOAD Dec 13 14:33:25.532000 audit: BPF prog-id=35 op=LOAD Dec 13 14:33:25.533000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:33:25.533000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:33:25.550601 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:33:25.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.571374 systemd[1]: Finished ensure-sysext.service. Dec 13 14:33:25.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.572942 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:25.573234 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:33:25.574518 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:33:25.576532 systemd[1]: Starting modprobe@drm.service... Dec 13 14:33:25.578118 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:33:25.580514 systemd[1]: Starting modprobe@loop.service... Dec 13 14:33:25.581268 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:33:25.581439 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:25.582766 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:33:25.584098 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:33:25.584819 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:33:25.585123 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:33:25.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.586133 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:33:25.586325 systemd[1]: Finished modprobe@drm.service. Dec 13 14:33:25.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.587429 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:33:25.587647 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:33:25.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.588568 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:33:25.588754 systemd[1]: Finished modprobe@loop.service. Dec 13 14:33:25.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:25.589628 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:33:25.589746 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:33:25.685098 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:33:25.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:26.201058 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:33:26.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:26.203501 systemd[1]: Starting audit-rules.service... Dec 13 14:33:26.205567 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:33:26.209000 audit: BPF prog-id=36 op=LOAD Dec 13 14:33:26.208139 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:33:26.210605 systemd[1]: Starting systemd-resolved.service... Dec 13 14:33:26.213000 audit: BPF prog-id=37 op=LOAD Dec 13 14:33:26.215141 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:33:26.218631 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:33:26.234490 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:33:26.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:26.235152 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:33:26.238000 audit[1087]: SYSTEM_BOOT pid=1087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:33:26.241872 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:33:26.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:26.402068 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:33:26.403586 systemd[1]: Reached target time-set.target. Dec 13 14:33:26.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:26.440220 systemd-resolved[1085]: Positive Trust Anchors: Dec 13 14:33:26.440990 systemd-resolved[1085]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:33:26.441207 systemd-resolved[1085]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:33:27.512521 systemd-timesyncd[1086]: Contacted time server 82.64.100.180:123 (0.flatcar.pool.ntp.org). Dec 13 14:33:27.512598 systemd-timesyncd[1086]: Initial clock synchronization to Fri 2024-12-13 14:33:27.512383 UTC. Dec 13 14:33:27.514611 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:33:27.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:27.578214 systemd-resolved[1085]: Using system hostname 'ci-3510-3-6-7-66d90f3bba.novalocal'. Dec 13 14:33:27.581576 systemd[1]: Started systemd-resolved.service. Dec 13 14:33:27.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:27.583028 systemd[1]: Reached target network.target. Dec 13 14:33:27.584070 systemd[1]: Reached target network-online.target. Dec 13 14:33:27.585145 systemd[1]: Reached target nss-lookup.target. Dec 13 14:33:27.669000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:33:27.669000 audit[1103]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc81542b30 a2=420 a3=0 items=0 ppid=1082 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:27.670396 augenrules[1103]: No rules Dec 13 14:33:27.669000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:33:27.672953 systemd[1]: Finished audit-rules.service. Dec 13 14:33:28.159163 ldconfig[987]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:33:28.187700 systemd[1]: Finished ldconfig.service. Dec 13 14:33:28.193091 systemd[1]: Starting systemd-update-done.service... Dec 13 14:33:28.207749 systemd[1]: Finished systemd-update-done.service. Dec 13 14:33:28.209184 systemd[1]: Reached target sysinit.target. Dec 13 14:33:28.210550 systemd[1]: Started motdgen.path. Dec 13 14:33:28.211967 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:33:28.213810 systemd[1]: Started logrotate.timer. Dec 13 14:33:28.215132 systemd[1]: Started mdadm.timer. Dec 13 14:33:28.216289 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:33:28.217486 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:33:28.217559 systemd[1]: Reached target paths.target. Dec 13 14:33:28.218833 systemd[1]: Reached target timers.target. Dec 13 14:33:28.220498 systemd[1]: Listening on dbus.socket. Dec 13 14:33:28.224022 systemd[1]: Starting docker.socket... Dec 13 14:33:28.231436 systemd[1]: Listening on sshd.socket. Dec 13 14:33:28.232985 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:28.234066 systemd[1]: Listening on docker.socket. Dec 13 14:33:28.235409 systemd[1]: Reached target sockets.target. Dec 13 14:33:28.236492 systemd[1]: Reached target basic.target. Dec 13 14:33:28.237647 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:33:28.237768 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:33:28.240286 systemd[1]: Starting containerd.service... Dec 13 14:33:28.243873 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:33:28.247979 systemd[1]: Starting dbus.service... Dec 13 14:33:28.253994 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:33:28.266082 systemd[1]: Starting extend-filesystems.service... Dec 13 14:33:28.267574 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:33:28.276307 jq[1116]: false Dec 13 14:33:28.278988 systemd[1]: Starting kubelet.service... Dec 13 14:33:28.288353 systemd[1]: Starting motdgen.service... Dec 13 14:33:28.293767 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:33:28.296695 systemd[1]: Starting sshd-keygen.service... Dec 13 14:33:28.304557 systemd[1]: Starting systemd-logind.service... Dec 13 14:33:28.306818 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:33:28.306937 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:33:28.307565 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:33:28.309291 systemd[1]: Starting update-engine.service... Dec 13 14:33:28.312774 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:33:28.327427 jq[1125]: true Dec 13 14:33:28.317619 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:33:28.317916 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:33:28.334615 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:33:28.334876 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:33:28.363160 jq[1129]: true Dec 13 14:33:28.404484 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:33:28.404787 systemd[1]: Finished motdgen.service. Dec 13 14:33:28.423589 extend-filesystems[1117]: Found loop1 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda1 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda2 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda3 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found usr Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda4 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda6 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda7 Dec 13 14:33:28.424987 extend-filesystems[1117]: Found vda9 Dec 13 14:33:28.424987 extend-filesystems[1117]: Checking size of /dev/vda9 Dec 13 14:33:28.433732 env[1130]: time="2024-12-13T14:33:28.432151090Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:33:28.464484 env[1130]: time="2024-12-13T14:33:28.464426032Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:33:28.464846 env[1130]: time="2024-12-13T14:33:28.464825682Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:28.466434 env[1130]: time="2024-12-13T14:33:28.466401166Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:33:28.466536 env[1130]: time="2024-12-13T14:33:28.466517775Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:28.470907 env[1130]: time="2024-12-13T14:33:28.470843949Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:33:28.471071 env[1130]: time="2024-12-13T14:33:28.471051618Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:28.471170 env[1130]: time="2024-12-13T14:33:28.471150263Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:33:28.471259 env[1130]: time="2024-12-13T14:33:28.471242747Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:28.471498 env[1130]: time="2024-12-13T14:33:28.471467578Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:28.471954 env[1130]: time="2024-12-13T14:33:28.471927110Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:33:28.472245 env[1130]: time="2024-12-13T14:33:28.472203609Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:33:28.472347 env[1130]: time="2024-12-13T14:33:28.472330206Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:33:28.472507 env[1130]: time="2024-12-13T14:33:28.472468766Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:33:28.472604 env[1130]: time="2024-12-13T14:33:28.472588010Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:33:28.549087 systemd-logind[1123]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:33:28.549120 systemd-logind[1123]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:33:28.549964 systemd-logind[1123]: New seat seat0. Dec 13 14:33:28.669097 extend-filesystems[1117]: Resized partition /dev/vda9 Dec 13 14:33:28.737549 extend-filesystems[1169]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:33:29.003003 sshd_keygen[1141]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:33:29.028117 dbus-daemon[1113]: [system] SELinux support is enabled Dec 13 14:33:29.028508 systemd[1]: Started dbus.service. Dec 13 14:33:29.034076 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:33:29.034137 systemd[1]: Reached target system-config.target. Dec 13 14:33:29.035496 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:33:29.035547 systemd[1]: Reached target user-config.target. Dec 13 14:33:29.040669 dbus-daemon[1113]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:33:29.041091 systemd[1]: Started systemd-logind.service. Dec 13 14:33:29.071694 systemd[1]: Finished sshd-keygen.service. Dec 13 14:33:29.076515 systemd[1]: Starting issuegen.service... Dec 13 14:33:29.090484 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:33:29.090922 systemd[1]: Finished issuegen.service. Dec 13 14:33:29.095894 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:33:29.116781 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 14:33:29.124856 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:33:29.131113 systemd[1]: Started getty@tty1.service. Dec 13 14:33:29.135139 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:33:29.145847 systemd[1]: Reached target getty.target. Dec 13 14:33:29.226014 update_engine[1124]: I1213 14:33:29.224054 1124 main.cc:92] Flatcar Update Engine starting Dec 13 14:33:29.234656 systemd[1]: Started update-engine.service. Dec 13 14:33:29.235443 update_engine[1124]: I1213 14:33:29.235026 1124 update_check_scheduler.cc:74] Next update check in 5m50s Dec 13 14:33:29.240697 systemd[1]: Started locksmithd.service. Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.362913876Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363031116Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363065851Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363211464Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363252230Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363286605Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363318625Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363352338Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363388466Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363433851Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363468396Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.363499985Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.372845623Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:33:29.375343 env[1130]: time="2024-12-13T14:33:29.373088598Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.373744038Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.373812546Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.373849035Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.373948601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.373994507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374027539Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374057516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374088514Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374119151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374156121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374185967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374224178Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374550470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374607006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.376289 env[1130]: time="2024-12-13T14:33:29.374639006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.377116 env[1130]: time="2024-12-13T14:33:29.374669083Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:33:29.378238 env[1130]: time="2024-12-13T14:33:29.377391549Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:33:29.378238 env[1130]: time="2024-12-13T14:33:29.377457082Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:33:29.378238 env[1130]: time="2024-12-13T14:33:29.377501755Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:33:29.378238 env[1130]: time="2024-12-13T14:33:29.377583960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:33:29.378646 env[1130]: time="2024-12-13T14:33:29.378085019Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:33:29.378646 env[1130]: time="2024-12-13T14:33:29.378239228Z" level=info msg="Connect containerd service" Dec 13 14:33:29.378646 env[1130]: time="2024-12-13T14:33:29.378317565Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:33:30.039974 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 14:33:30.040139 extend-filesystems[1169]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:33:30.040139 extend-filesystems[1169]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 14:33:30.040139 extend-filesystems[1169]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 14:33:30.046494 bash[1160]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:33:29.381142 systemd[1]: Started containerd.service. Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.379469406Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380075202Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380082075Z" level=info msg="Start subscribing containerd event" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380305454Z" level=info msg="Start recovering state" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380441679Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380479650Z" level=info msg="Start event monitor" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380821822Z" level=info msg="Start snapshots syncer" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380848642Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.380868590Z" level=info msg="Start streaming server" Dec 13 14:33:30.046857 env[1130]: time="2024-12-13T14:33:29.381104452Z" level=info msg="containerd successfully booted in 0.949842s" Dec 13 14:33:30.047385 extend-filesystems[1117]: Resized filesystem in /dev/vda9 Dec 13 14:33:29.491108 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:33:30.042349 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:33:30.042752 systemd[1]: Finished extend-filesystems.service. Dec 13 14:33:30.114688 locksmithd[1184]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:33:34.363522 systemd[1]: Started kubelet.service. Dec 13 14:33:35.450335 coreos-metadata[1112]: Dec 13 14:33:35.450 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:33:35.592595 coreos-metadata[1112]: Dec 13 14:33:35.592 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 14:33:35.777523 coreos-metadata[1112]: Dec 13 14:33:35.777 INFO Fetch successful Dec 13 14:33:35.777523 coreos-metadata[1112]: Dec 13 14:33:35.777 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:33:35.799160 coreos-metadata[1112]: Dec 13 14:33:35.798 INFO Fetch successful Dec 13 14:33:35.815113 unknown[1112]: wrote ssh authorized keys file for user: core Dec 13 14:33:35.904177 update-ssh-keys[1201]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:33:35.905451 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:33:35.906485 systemd[1]: Reached target multi-user.target. Dec 13 14:33:35.909614 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:33:35.931225 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:33:35.931612 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:33:35.932984 systemd[1]: Startup finished in 1.000s (kernel) + 9.121s (initrd) + 22.996s (userspace) = 33.118s. Dec 13 14:33:36.406416 systemd[1]: Created slice system-sshd.slice. Dec 13 14:33:36.410484 systemd[1]: Started sshd@0-172.24.4.233:22-172.24.4.1:46052.service. Dec 13 14:33:36.912935 kubelet[1193]: E1213 14:33:36.912852 1193 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:36.917196 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:36.917487 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:36.918223 systemd[1]: kubelet.service: Consumed 2.806s CPU time. Dec 13 14:33:37.743384 sshd[1204]: Accepted publickey for core from 172.24.4.1 port 46052 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:37.749389 sshd[1204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:37.771023 systemd[1]: Created slice user-500.slice. Dec 13 14:33:37.772511 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:33:37.780795 systemd-logind[1123]: New session 1 of user core. Dec 13 14:33:37.787871 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:33:37.790079 systemd[1]: Starting user@500.service... Dec 13 14:33:37.794943 (systemd)[1208]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:37.899374 systemd[1208]: Queued start job for default target default.target. Dec 13 14:33:37.900414 systemd[1208]: Reached target paths.target. Dec 13 14:33:37.900562 systemd[1208]: Reached target sockets.target. Dec 13 14:33:37.900661 systemd[1208]: Reached target timers.target. Dec 13 14:33:37.900780 systemd[1208]: Reached target basic.target. Dec 13 14:33:37.901048 systemd[1208]: Reached target default.target. Dec 13 14:33:37.901165 systemd[1]: Started user@500.service. Dec 13 14:33:37.901268 systemd[1208]: Startup finished in 98ms. Dec 13 14:33:37.902872 systemd[1]: Started session-1.scope. Dec 13 14:33:38.407329 systemd[1]: Started sshd@1-172.24.4.233:22-172.24.4.1:46566.service. Dec 13 14:33:39.622325 sshd[1217]: Accepted publickey for core from 172.24.4.1 port 46566 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:39.634947 sshd[1217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:39.647601 systemd-logind[1123]: New session 2 of user core. Dec 13 14:33:39.648550 systemd[1]: Started session-2.scope. Dec 13 14:33:40.266347 sshd[1217]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:40.275388 systemd[1]: Started sshd@2-172.24.4.233:22-172.24.4.1:46582.service. Dec 13 14:33:40.276572 systemd[1]: sshd@1-172.24.4.233:22-172.24.4.1:46566.service: Deactivated successfully. Dec 13 14:33:40.278388 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:33:40.282372 systemd-logind[1123]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:33:40.285778 systemd-logind[1123]: Removed session 2. Dec 13 14:33:41.772207 sshd[1222]: Accepted publickey for core from 172.24.4.1 port 46582 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:41.775143 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:41.786419 systemd-logind[1123]: New session 3 of user core. Dec 13 14:33:41.787298 systemd[1]: Started session-3.scope. Dec 13 14:33:42.463754 sshd[1222]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:42.472145 systemd[1]: sshd@2-172.24.4.233:22-172.24.4.1:46582.service: Deactivated successfully. Dec 13 14:33:42.473989 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:33:42.476145 systemd-logind[1123]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:33:42.478647 systemd[1]: Started sshd@3-172.24.4.233:22-172.24.4.1:46598.service. Dec 13 14:33:42.484864 systemd-logind[1123]: Removed session 3. Dec 13 14:33:43.951927 sshd[1229]: Accepted publickey for core from 172.24.4.1 port 46598 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:43.954878 sshd[1229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:43.964317 systemd[1]: Started session-4.scope. Dec 13 14:33:43.965481 systemd-logind[1123]: New session 4 of user core. Dec 13 14:33:44.703585 sshd[1229]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:44.711444 systemd[1]: Started sshd@4-172.24.4.233:22-172.24.4.1:55490.service. Dec 13 14:33:44.716693 systemd[1]: sshd@3-172.24.4.233:22-172.24.4.1:46598.service: Deactivated successfully. Dec 13 14:33:44.718302 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:33:44.722328 systemd-logind[1123]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:33:44.724666 systemd-logind[1123]: Removed session 4. Dec 13 14:33:46.031948 sshd[1234]: Accepted publickey for core from 172.24.4.1 port 55490 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:46.035333 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:46.045338 systemd[1]: Started session-5.scope. Dec 13 14:33:46.046413 systemd-logind[1123]: New session 5 of user core. Dec 13 14:33:46.650330 sudo[1238]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:33:46.650994 sudo[1238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:46.663980 dbus-daemon[1113]: \xd0\u000d\u000fe\xa5U: received setenforce notice (enforcing=44005136) Dec 13 14:33:46.665921 sudo[1238]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:46.979977 sshd[1234]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:46.987817 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:33:46.988403 systemd[1]: Stopped kubelet.service. Dec 13 14:33:46.988557 systemd[1]: kubelet.service: Consumed 2.806s CPU time. Dec 13 14:33:46.992617 systemd[1]: Starting kubelet.service... Dec 13 14:33:46.996272 systemd[1]: Started sshd@5-172.24.4.233:22-172.24.4.1:55500.service. Dec 13 14:33:46.998866 systemd[1]: sshd@4-172.24.4.233:22-172.24.4.1:55490.service: Deactivated successfully. Dec 13 14:33:47.008576 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:33:47.011513 systemd-logind[1123]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:33:47.014366 systemd-logind[1123]: Removed session 5. Dec 13 14:33:47.325915 systemd[1]: Started kubelet.service. Dec 13 14:33:47.982866 kubelet[1248]: E1213 14:33:47.982686 1248 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:47.990079 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:47.990465 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:48.168072 sshd[1242]: Accepted publickey for core from 172.24.4.1 port 55500 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:48.171129 sshd[1242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:48.183155 systemd[1]: Started session-6.scope. Dec 13 14:33:48.184354 systemd-logind[1123]: New session 6 of user core. Dec 13 14:33:48.636868 sudo[1256]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:33:48.637359 sudo[1256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:48.644875 sudo[1256]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:48.654926 sudo[1255]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:33:48.655409 sudo[1255]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:48.676655 systemd[1]: Stopping audit-rules.service... Dec 13 14:33:48.677000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:33:48.681369 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:33:48.681504 kernel: audit: type=1305 audit(1734100428.677:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:33:48.677000 audit[1259]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd57d17750 a2=420 a3=0 items=0 ppid=1 pid=1259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.687993 auditctl[1259]: No rules Dec 13 14:33:48.700563 kernel: audit: type=1300 audit(1734100428.677:204): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd57d17750 a2=420 a3=0 items=0 ppid=1 pid=1259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.689048 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:33:48.689404 systemd[1]: Stopped audit-rules.service. Dec 13 14:33:48.677000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:33:48.702985 systemd[1]: Starting audit-rules.service... Dec 13 14:33:48.705946 kernel: audit: type=1327 audit(1734100428.677:204): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:33:48.714811 kernel: audit: type=1131 audit(1734100428.688:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.737651 augenrules[1276]: No rules Dec 13 14:33:48.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.739852 sudo[1255]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:48.738630 systemd[1]: Finished audit-rules.service. Dec 13 14:33:48.738000 audit[1255]: USER_END pid=1255 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.749141 kernel: audit: type=1130 audit(1734100428.738:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.749245 kernel: audit: type=1106 audit(1734100428.738:207): pid=1255 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.738000 audit[1255]: CRED_DISP pid=1255 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.753516 kernel: audit: type=1104 audit(1734100428.738:208): pid=1255 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.908194 sshd[1242]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:48.912000 audit[1242]: USER_END pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:48.915799 systemd[1]: Started sshd@6-172.24.4.233:22-172.24.4.1:55512.service. Dec 13 14:33:48.923207 kernel: audit: type=1106 audit(1734100428.912:209): pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:48.912000 audit[1242]: CRED_DISP pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:48.928284 systemd[1]: sshd@5-172.24.4.233:22-172.24.4.1:55500.service: Deactivated successfully. Dec 13 14:33:48.934460 kernel: audit: type=1104 audit(1734100428.912:210): pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:48.934539 kernel: audit: type=1130 audit(1734100428.914:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.233:22-172.24.4.1:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.233:22-172.24.4.1:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.930086 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:33:48.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.233:22-172.24.4.1:55500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:48.935826 systemd-logind[1123]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:33:48.937537 systemd-logind[1123]: Removed session 6. Dec 13 14:33:50.231000 audit[1281]: USER_ACCT pid=1281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:50.232683 sshd[1281]: Accepted publickey for core from 172.24.4.1 port 55512 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:33:50.233000 audit[1281]: CRED_ACQ pid=1281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:50.234000 audit[1281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8d873dc0 a2=3 a3=0 items=0 ppid=1 pid=1281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:50.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:33:50.236617 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:33:50.246502 systemd[1]: Started session-7.scope. Dec 13 14:33:50.247017 systemd-logind[1123]: New session 7 of user core. Dec 13 14:33:50.259000 audit[1281]: USER_START pid=1281 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:50.263000 audit[1284]: CRED_ACQ pid=1284 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:33:50.702000 audit[1285]: USER_ACCT pid=1285 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:50.704018 sudo[1285]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:33:50.703000 audit[1285]: CRED_REFR pid=1285 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:50.704823 sudo[1285]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:33:50.708000 audit[1285]: USER_START pid=1285 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:50.742102 systemd[1]: Starting coreos-metadata.service... Dec 13 14:33:57.808329 coreos-metadata[1289]: Dec 13 14:33:57.808 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:33:57.894052 coreos-metadata[1289]: Dec 13 14:33:57.893 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:33:58.033390 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:33:58.045947 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 14:33:58.046048 kernel: audit: type=1130 audit(1734100438.033:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.034232 systemd[1]: Stopped kubelet.service. Dec 13 14:33:58.037483 systemd[1]: Starting kubelet.service... Dec 13 14:33:58.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.057836 kernel: audit: type=1131 audit(1734100438.033:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.088501 coreos-metadata[1289]: Dec 13 14:33:58.088 INFO Fetch successful Dec 13 14:33:58.088501 coreos-metadata[1289]: Dec 13 14:33:58.088 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Dec 13 14:33:58.107278 coreos-metadata[1289]: Dec 13 14:33:58.107 INFO Fetch successful Dec 13 14:33:58.107278 coreos-metadata[1289]: Dec 13 14:33:58.107 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Dec 13 14:33:58.125959 coreos-metadata[1289]: Dec 13 14:33:58.125 INFO Fetch successful Dec 13 14:33:58.126477 coreos-metadata[1289]: Dec 13 14:33:58.126 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Dec 13 14:33:58.144217 coreos-metadata[1289]: Dec 13 14:33:58.144 INFO Fetch successful Dec 13 14:33:58.144217 coreos-metadata[1289]: Dec 13 14:33:58.144 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Dec 13 14:33:58.161604 coreos-metadata[1289]: Dec 13 14:33:58.161 INFO Fetch successful Dec 13 14:33:58.185133 systemd[1]: Finished coreos-metadata.service. Dec 13 14:33:58.198059 kernel: audit: type=1130 audit(1734100438.184:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.662050 systemd[1]: Started kubelet.service. Dec 13 14:33:58.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.671744 kernel: audit: type=1130 audit(1734100438.661:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:58.762511 kubelet[1309]: E1213 14:33:58.761899 1309 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:58.764978 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:58.765110 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:58.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:58.770768 kernel: audit: type=1131 audit(1734100438.764:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:34:00.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:00.410152 systemd[1]: Stopped kubelet.service. Dec 13 14:34:00.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:00.428622 kernel: audit: type=1130 audit(1734100440.409:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:00.428798 kernel: audit: type=1131 audit(1734100440.409:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:00.430455 systemd[1]: Starting kubelet.service... Dec 13 14:34:00.469262 systemd[1]: Reloading. Dec 13 14:34:00.579112 /usr/lib/systemd/system-generators/torcx-generator[1361]: time="2024-12-13T14:34:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:34:00.579151 /usr/lib/systemd/system-generators/torcx-generator[1361]: time="2024-12-13T14:34:00Z" level=info msg="torcx already run" Dec 13 14:34:00.750246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:34:00.750269 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:34:00.773725 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:34:00.856992 kernel: audit: type=1400 audit(1734100440.846:228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871180 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:34:00.871371 kernel: audit: type=1400 audit(1734100440.846:229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit: BPF prog-id=43 op=LOAD Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.855000 audit: BPF prog-id=44 op=LOAD Dec 13 14:34:00.855000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:34:00.855000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.857000 audit: BPF prog-id=45 op=LOAD Dec 13 14:34:00.858000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit: BPF prog-id=46 op=LOAD Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.858000 audit: BPF prog-id=47 op=LOAD Dec 13 14:34:00.858000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:34:00.858000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.860000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:34:00.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit: BPF prog-id=50 op=LOAD Dec 13 14:34:00.871000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit: BPF prog-id=53 op=LOAD Dec 13 14:34:00.875000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit: BPF prog-id=54 op=LOAD Dec 13 14:34:00.876000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit: BPF prog-id=55 op=LOAD Dec 13 14:34:00.876000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit: BPF prog-id=56 op=LOAD Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.877000 audit: BPF prog-id=57 op=LOAD Dec 13 14:34:00.877000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:34:00.877000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:34:00.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:00.900207 systemd[1]: Started kubelet.service. Dec 13 14:34:00.904907 systemd[1]: Stopping kubelet.service... Dec 13 14:34:00.905806 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:34:00.906313 systemd[1]: Stopped kubelet.service. Dec 13 14:34:00.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:00.911247 systemd[1]: Starting kubelet.service... Dec 13 14:34:01.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:01.036388 systemd[1]: Started kubelet.service. Dec 13 14:34:01.790063 kubelet[1419]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:34:01.790063 kubelet[1419]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:34:01.790063 kubelet[1419]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:34:01.791038 kubelet[1419]: I1213 14:34:01.790187 1419 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:34:02.757402 kubelet[1419]: I1213 14:34:02.757345 1419 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:34:02.757402 kubelet[1419]: I1213 14:34:02.757391 1419 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:34:02.757798 kubelet[1419]: I1213 14:34:02.757768 1419 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:34:02.784580 kubelet[1419]: I1213 14:34:02.784531 1419 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:34:02.812647 kubelet[1419]: I1213 14:34:02.812611 1419 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:34:02.813286 kubelet[1419]: I1213 14:34:02.813251 1419 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:34:02.813800 kubelet[1419]: I1213 14:34:02.813382 1419 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.233","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:34:02.818662 kubelet[1419]: I1213 14:34:02.818640 1419 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:34:02.818842 kubelet[1419]: I1213 14:34:02.818792 1419 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:34:02.819051 kubelet[1419]: I1213 14:34:02.819037 1419 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:34:02.820406 kubelet[1419]: I1213 14:34:02.820390 1419 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:34:02.820506 kubelet[1419]: I1213 14:34:02.820495 1419 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:34:02.820589 kubelet[1419]: I1213 14:34:02.820579 1419 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:34:02.822135 kubelet[1419]: I1213 14:34:02.822095 1419 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:34:02.822576 kubelet[1419]: E1213 14:34:02.822548 1419 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:02.822675 kubelet[1419]: E1213 14:34:02.822657 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:02.836858 kubelet[1419]: I1213 14:34:02.836836 1419 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:34:02.838915 kubelet[1419]: I1213 14:34:02.838897 1419 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:34:02.839071 kubelet[1419]: W1213 14:34:02.839058 1419 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:34:02.839762 kubelet[1419]: I1213 14:34:02.839735 1419 server.go:1264] "Started kubelet" Dec 13 14:34:02.842321 kubelet[1419]: I1213 14:34:02.842170 1419 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:34:02.845345 kubelet[1419]: I1213 14:34:02.845306 1419 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:34:02.850269 kubelet[1419]: I1213 14:34:02.850217 1419 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:34:02.849000 audit[1419]: AVC avc: denied { mac_admin } for pid=1419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:02.849000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:34:02.849000 audit[1419]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d76e40 a1=c00063db30 a2=c000d76e10 a3=25 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.849000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:34:02.851368 kubelet[1419]: I1213 14:34:02.851350 1419 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:34:02.851467 kubelet[1419]: I1213 14:34:02.850379 1419 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:34:02.850000 audit[1419]: AVC avc: denied { mac_admin } for pid=1419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:02.850000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:34:02.850000 audit[1419]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c43a80 a1=c00035da88 a2=c0006274a0 a3=25 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.850000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:34:02.851818 kubelet[1419]: I1213 14:34:02.851568 1419 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:34:02.851950 kubelet[1419]: I1213 14:34:02.851938 1419 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:34:02.853457 kubelet[1419]: W1213 14:34:02.853399 1419 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.24.4.233" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:34:02.853539 kubelet[1419]: E1213 14:34:02.853489 1419 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.233" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:34:02.853673 kubelet[1419]: W1213 14:34:02.853636 1419 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:34:02.853812 kubelet[1419]: E1213 14:34:02.853699 1419 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:34:02.862072 kubelet[1419]: I1213 14:34:02.862033 1419 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:34:02.863078 kubelet[1419]: I1213 14:34:02.863042 1419 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:34:02.863308 kubelet[1419]: I1213 14:34:02.863281 1419 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:34:02.866957 kubelet[1419]: E1213 14:34:02.866910 1419 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:34:02.869445 kubelet[1419]: I1213 14:34:02.867769 1419 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:34:02.869445 kubelet[1419]: I1213 14:34:02.868000 1419 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:34:02.875210 kubelet[1419]: I1213 14:34:02.875161 1419 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:34:02.896530 kubelet[1419]: E1213 14:34:02.896445 1419 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.233\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:34:02.896872 kubelet[1419]: W1213 14:34:02.896615 1419 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:34:02.896872 kubelet[1419]: E1213 14:34:02.896642 1419 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:34:02.897086 kubelet[1419]: E1213 14:34:02.896773 1419 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.233.1810c32a444eb174 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.233,UID:172.24.4.233,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.24.4.233,},FirstTimestamp:2024-12-13 14:34:02.839691636 +0000 UTC m=+1.797411040,LastTimestamp:2024-12-13 14:34:02.839691636 +0000 UTC m=+1.797411040,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.233,}" Dec 13 14:34:02.900750 kubelet[1419]: I1213 14:34:02.900696 1419 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:34:02.900750 kubelet[1419]: I1213 14:34:02.900741 1419 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:34:02.901022 kubelet[1419]: I1213 14:34:02.900764 1419 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:34:02.914538 kubelet[1419]: E1213 14:34:02.914313 1419 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.24.4.233.1810c32a45ed94ac default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.24.4.233,UID:172.24.4.233,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.24.4.233,},FirstTimestamp:2024-12-13 14:34:02.866881708 +0000 UTC m=+1.824601222,LastTimestamp:2024-12-13 14:34:02.866881708 +0000 UTC m=+1.824601222,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.24.4.233,}" Dec 13 14:34:02.921907 kubelet[1419]: I1213 14:34:02.921847 1419 policy_none.go:49] "None policy: Start" Dec 13 14:34:02.929560 kubelet[1419]: I1213 14:34:02.929530 1419 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:34:02.929773 kubelet[1419]: I1213 14:34:02.929755 1419 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:34:02.940000 audit[1433]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:02.940000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe28af7f40 a2=0 a3=7ffe28af7f2c items=0 ppid=1419 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:34:02.945000 audit[1436]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:02.945000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdf8512f30 a2=0 a3=7ffdf8512f1c items=0 ppid=1419 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:34:02.951896 systemd[1]: Created slice kubepods.slice. Dec 13 14:34:02.961404 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:34:02.963512 kubelet[1419]: I1213 14:34:02.963488 1419 kubelet_node_status.go:73] "Attempting to register node" node="172.24.4.233" Dec 13 14:34:02.969188 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:34:02.950000 audit[1438]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:02.950000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6822d520 a2=0 a3=7ffd6822d50c items=0 ppid=1419 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:02.974354 kubelet[1419]: I1213 14:34:02.974325 1419 kubelet_node_status.go:76] "Successfully registered node" node="172.24.4.233" Dec 13 14:34:02.975794 kubelet[1419]: I1213 14:34:02.975759 1419 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:34:02.975000 audit[1419]: AVC avc: denied { mac_admin } for pid=1419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:02.975000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:34:02.975000 audit[1419]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e80930 a1=c000e96a98 a2=c000e80900 a3=25 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.975000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:34:02.976226 kubelet[1419]: I1213 14:34:02.975866 1419 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:34:02.976226 kubelet[1419]: I1213 14:34:02.976052 1419 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:34:02.976226 kubelet[1419]: I1213 14:34:02.976209 1419 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:34:02.980646 kubelet[1419]: E1213 14:34:02.980597 1419 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.233\" not found" Dec 13 14:34:02.982000 audit[1444]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:02.982000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd30766ee0 a2=0 a3=7ffd30766ecc items=0 ppid=1419 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:02.993043 kubelet[1419]: E1213 14:34:02.993007 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.065736 kernel: kauditd_printk_skb: 270 callbacks suppressed Dec 13 14:34:03.065897 kernel: audit: type=1325 audit(1734100443.062:373): table=filter:6 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:03.062000 audit[1449]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:03.062000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcd9bd2840 a2=0 a3=7ffcd9bd282c items=0 ppid=1419 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.069068 kubelet[1419]: I1213 14:34:03.069016 1419 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:34:03.075616 kernel: audit: type=1300 audit(1734100443.062:373): arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcd9bd2840 a2=0 a3=7ffcd9bd282c items=0 ppid=1419 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.075873 kubelet[1419]: I1213 14:34:03.075818 1419 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:34:03.075873 kubelet[1419]: I1213 14:34:03.075872 1419 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:34:03.075978 kubelet[1419]: I1213 14:34:03.075908 1419 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:34:03.076029 kubelet[1419]: E1213 14:34:03.075993 1419 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:34:03.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:34:03.069000 audit[1450]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:03.086975 kernel: audit: type=1327 audit(1734100443.062:373): proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:34:03.087063 kernel: audit: type=1325 audit(1734100443.069:374): table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:03.087084 kernel: audit: type=1300 audit(1734100443.069:374): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe06496e70 a2=0 a3=7ffe06496e5c items=0 ppid=1419 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.069000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe06496e70 a2=0 a3=7ffe06496e5c items=0 ppid=1419 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:34:03.093948 kubelet[1419]: E1213 14:34:03.093929 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.096504 kernel: audit: type=1327 audit(1734100443.069:374): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:34:03.096584 kernel: audit: type=1325 audit(1734100443.076:375): table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:03.076000 audit[1452]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:03.099604 kernel: audit: type=1300 audit(1734100443.076:375): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7ac1cf30 a2=0 a3=7ffe7ac1cf1c items=0 ppid=1419 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.076000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7ac1cf30 a2=0 a3=7ffe7ac1cf1c items=0 ppid=1419 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.107094 kernel: audit: type=1327 audit(1734100443.076:375): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:34:03.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:34:03.077000 audit[1451]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:03.113912 kernel: audit: type=1325 audit(1734100443.077:376): table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:03.077000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc83d66870 a2=0 a3=10e3 items=0 ppid=1419 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:34:03.078000 audit[1453]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:03.078000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2b135f30 a2=0 a3=7ffc2b135f1c items=0 ppid=1419 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:34:03.079000 audit[1454]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:03.079000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc34dc0fe0 a2=0 a3=7ffc34dc0fcc items=0 ppid=1419 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:34:03.080000 audit[1455]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:03.080000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2fb1ebe0 a2=0 a3=7fff2fb1ebcc items=0 ppid=1419 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:34:03.083000 audit[1456]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:03.083000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8c00ea90 a2=0 a3=7ffe8c00ea7c items=0 ppid=1419 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:03.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:34:03.116000 audit[1285]: USER_END pid=1285 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:03.116000 audit[1285]: CRED_DISP pid=1285 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:34:03.117237 sudo[1285]: pam_unix(sudo:session): session closed for user root Dec 13 14:34:03.194629 kubelet[1419]: E1213 14:34:03.194555 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.266420 sshd[1281]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:03.269000 audit[1281]: USER_END pid=1281 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:03.269000 audit[1281]: CRED_DISP pid=1281 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:03.273200 systemd[1]: sshd@6-172.24.4.233:22-172.24.4.1:55512.service: Deactivated successfully. Dec 13 14:34:03.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.233:22-172.24.4.1:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:03.275297 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:34:03.275829 systemd[1]: session-7.scope: Consumed 1.118s CPU time. Dec 13 14:34:03.278305 systemd-logind[1123]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:34:03.282991 systemd-logind[1123]: Removed session 7. Dec 13 14:34:03.295914 kubelet[1419]: E1213 14:34:03.295803 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.396299 kubelet[1419]: E1213 14:34:03.396019 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.496349 kubelet[1419]: E1213 14:34:03.496222 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.597452 kubelet[1419]: E1213 14:34:03.597373 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.698894 kubelet[1419]: E1213 14:34:03.698576 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.760573 kubelet[1419]: I1213 14:34:03.760514 1419 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:34:03.761532 kubelet[1419]: W1213 14:34:03.761496 1419 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:34:03.799031 kubelet[1419]: E1213 14:34:03.798938 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:03.823363 kubelet[1419]: E1213 14:34:03.823301 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:03.900271 kubelet[1419]: E1213 14:34:03.900165 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:04.001763 kubelet[1419]: E1213 14:34:04.001514 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:04.101793 kubelet[1419]: E1213 14:34:04.101742 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:04.203278 kubelet[1419]: E1213 14:34:04.203201 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:04.303899 kubelet[1419]: E1213 14:34:04.303841 1419 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.233\" not found" Dec 13 14:34:04.405878 kubelet[1419]: I1213 14:34:04.405824 1419 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:34:04.407290 env[1130]: time="2024-12-13T14:34:04.407081008Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:34:04.408209 kubelet[1419]: I1213 14:34:04.408069 1419 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:34:04.823557 kubelet[1419]: I1213 14:34:04.823505 1419 apiserver.go:52] "Watching apiserver" Dec 13 14:34:04.824521 kubelet[1419]: E1213 14:34:04.824486 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:04.834266 kubelet[1419]: I1213 14:34:04.834157 1419 topology_manager.go:215] "Topology Admit Handler" podUID="93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42" podNamespace="calico-system" podName="calico-node-ltn7p" Dec 13 14:34:04.834555 kubelet[1419]: I1213 14:34:04.834363 1419 topology_manager.go:215] "Topology Admit Handler" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" podNamespace="calico-system" podName="csi-node-driver-kflh5" Dec 13 14:34:04.834555 kubelet[1419]: I1213 14:34:04.834508 1419 topology_manager.go:215] "Topology Admit Handler" podUID="79f2d849-0288-42d6-9ff4-8e40dbc009a3" podNamespace="kube-system" podName="kube-proxy-d4nmj" Dec 13 14:34:04.835184 kubelet[1419]: E1213 14:34:04.835123 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:04.856000 systemd[1]: Created slice kubepods-besteffort-pod79f2d849_0288_42d6_9ff4_8e40dbc009a3.slice. Dec 13 14:34:04.864132 kubelet[1419]: I1213 14:34:04.864088 1419 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:34:04.877143 kubelet[1419]: I1213 14:34:04.876418 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e0f7ad2a-84b1-4101-a330-b8e4b5952dfe-socket-dir\") pod \"csi-node-driver-kflh5\" (UID: \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\") " pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:04.877143 kubelet[1419]: I1213 14:34:04.876502 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79f2d849-0288-42d6-9ff4-8e40dbc009a3-xtables-lock\") pod \"kube-proxy-d4nmj\" (UID: \"79f2d849-0288-42d6-9ff4-8e40dbc009a3\") " pod="kube-system/kube-proxy-d4nmj" Dec 13 14:34:04.877143 kubelet[1419]: I1213 14:34:04.876549 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-node-certs\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.877143 kubelet[1419]: I1213 14:34:04.876591 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-var-run-calico\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.877143 kubelet[1419]: I1213 14:34:04.876643 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-var-lib-calico\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.877637 kubelet[1419]: I1213 14:34:04.876687 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-flexvol-driver-host\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.877637 kubelet[1419]: I1213 14:34:04.876804 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e0f7ad2a-84b1-4101-a330-b8e4b5952dfe-kubelet-dir\") pod \"csi-node-driver-kflh5\" (UID: \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\") " pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:04.877637 kubelet[1419]: I1213 14:34:04.876851 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-lib-modules\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.877637 kubelet[1419]: I1213 14:34:04.876892 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-policysync\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.877637 kubelet[1419]: I1213 14:34:04.876949 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-tigera-ca-bundle\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.878019 kubelet[1419]: I1213 14:34:04.876994 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jj7nl\" (UniqueName: \"kubernetes.io/projected/79f2d849-0288-42d6-9ff4-8e40dbc009a3-kube-api-access-jj7nl\") pod \"kube-proxy-d4nmj\" (UID: \"79f2d849-0288-42d6-9ff4-8e40dbc009a3\") " pod="kube-system/kube-proxy-d4nmj" Dec 13 14:34:04.878019 kubelet[1419]: I1213 14:34:04.877035 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e0f7ad2a-84b1-4101-a330-b8e4b5952dfe-varrun\") pod \"csi-node-driver-kflh5\" (UID: \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\") " pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:04.878019 kubelet[1419]: I1213 14:34:04.877079 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e0f7ad2a-84b1-4101-a330-b8e4b5952dfe-registration-dir\") pod \"csi-node-driver-kflh5\" (UID: \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\") " pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:04.878019 kubelet[1419]: I1213 14:34:04.877125 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k4g9f\" (UniqueName: \"kubernetes.io/projected/e0f7ad2a-84b1-4101-a330-b8e4b5952dfe-kube-api-access-k4g9f\") pod \"csi-node-driver-kflh5\" (UID: \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\") " pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:04.878019 kubelet[1419]: I1213 14:34:04.877167 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/79f2d849-0288-42d6-9ff4-8e40dbc009a3-kube-proxy\") pod \"kube-proxy-d4nmj\" (UID: \"79f2d849-0288-42d6-9ff4-8e40dbc009a3\") " pod="kube-system/kube-proxy-d4nmj" Dec 13 14:34:04.878370 kubelet[1419]: I1213 14:34:04.877209 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79f2d849-0288-42d6-9ff4-8e40dbc009a3-lib-modules\") pod \"kube-proxy-d4nmj\" (UID: \"79f2d849-0288-42d6-9ff4-8e40dbc009a3\") " pod="kube-system/kube-proxy-d4nmj" Dec 13 14:34:04.878370 kubelet[1419]: I1213 14:34:04.877251 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-xtables-lock\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.878370 kubelet[1419]: I1213 14:34:04.877298 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-cni-net-dir\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.878370 kubelet[1419]: I1213 14:34:04.877340 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-cni-log-dir\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.878370 kubelet[1419]: I1213 14:34:04.877383 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-cni-bin-dir\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.878817 kubelet[1419]: I1213 14:34:04.877439 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j44l7\" (UniqueName: \"kubernetes.io/projected/93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42-kube-api-access-j44l7\") pod \"calico-node-ltn7p\" (UID: \"93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42\") " pod="calico-system/calico-node-ltn7p" Dec 13 14:34:04.884079 systemd[1]: Created slice kubepods-besteffort-pod93ef5c03_fe72_4fb7_a36b_5c4c5cd23a42.slice. Dec 13 14:34:04.981526 kubelet[1419]: E1213 14:34:04.981470 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:04.982323 kubelet[1419]: W1213 14:34:04.982288 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:04.982791 kubelet[1419]: E1213 14:34:04.982752 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:04.983326 kubelet[1419]: E1213 14:34:04.983298 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:04.983517 kubelet[1419]: W1213 14:34:04.983489 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:04.983672 kubelet[1419]: E1213 14:34:04.983643 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:04.984186 kubelet[1419]: E1213 14:34:04.984161 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:04.984360 kubelet[1419]: W1213 14:34:04.984333 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:04.984516 kubelet[1419]: E1213 14:34:04.984490 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:04.985107 kubelet[1419]: E1213 14:34:04.985082 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:04.985378 kubelet[1419]: W1213 14:34:04.985301 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:04.985586 kubelet[1419]: E1213 14:34:04.985546 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:04.986119 kubelet[1419]: E1213 14:34:04.986083 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:04.986119 kubelet[1419]: W1213 14:34:04.986118 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:04.986408 kubelet[1419]: E1213 14:34:04.986375 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:04.987187 kubelet[1419]: E1213 14:34:04.987127 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:04.987301 kubelet[1419]: W1213 14:34:04.987186 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:04.987301 kubelet[1419]: E1213 14:34:04.987234 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:05.023755 kubelet[1419]: E1213 14:34:05.023545 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:05.023755 kubelet[1419]: W1213 14:34:05.023590 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:05.023755 kubelet[1419]: E1213 14:34:05.023632 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:05.036616 kubelet[1419]: E1213 14:34:05.036557 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:05.036616 kubelet[1419]: W1213 14:34:05.036608 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:05.036930 kubelet[1419]: E1213 14:34:05.036641 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:05.050617 kubelet[1419]: E1213 14:34:05.050580 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:05.050930 kubelet[1419]: W1213 14:34:05.050843 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:05.051092 kubelet[1419]: E1213 14:34:05.051065 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:05.052662 kubelet[1419]: E1213 14:34:05.052611 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:05.052662 kubelet[1419]: W1213 14:34:05.052646 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:05.052908 kubelet[1419]: E1213 14:34:05.052671 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:05.179504 env[1130]: time="2024-12-13T14:34:05.179243575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d4nmj,Uid:79f2d849-0288-42d6-9ff4-8e40dbc009a3,Namespace:kube-system,Attempt:0,}" Dec 13 14:34:05.193362 env[1130]: time="2024-12-13T14:34:05.193273002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ltn7p,Uid:93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:05.825273 kubelet[1419]: E1213 14:34:05.825181 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:06.078184 kubelet[1419]: E1213 14:34:06.077570 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:06.137422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount217579778.mount: Deactivated successfully. Dec 13 14:34:06.357267 env[1130]: time="2024-12-13T14:34:06.356810901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.383614 env[1130]: time="2024-12-13T14:34:06.383515318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.418119 env[1130]: time="2024-12-13T14:34:06.418021548Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.441109 env[1130]: time="2024-12-13T14:34:06.441008216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.459512 env[1130]: time="2024-12-13T14:34:06.459401507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.475190 env[1130]: time="2024-12-13T14:34:06.475042119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.483242 env[1130]: time="2024-12-13T14:34:06.483134531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.495428 env[1130]: time="2024-12-13T14:34:06.495345141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.740564 env[1130]: time="2024-12-13T14:34:06.739745977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:06.740564 env[1130]: time="2024-12-13T14:34:06.739849013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:06.740564 env[1130]: time="2024-12-13T14:34:06.739882947Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:06.741797 env[1130]: time="2024-12-13T14:34:06.741647372Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10744a506db8a17dd77e43971da51560cbaf4d22763feef2e6253eb76c7f691b pid=1480 runtime=io.containerd.runc.v2 Dec 13 14:34:06.787329 systemd[1]: Started cri-containerd-10744a506db8a17dd77e43971da51560cbaf4d22763feef2e6253eb76c7f691b.scope. Dec 13 14:34:06.794970 env[1130]: time="2024-12-13T14:34:06.790381043Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:06.794970 env[1130]: time="2024-12-13T14:34:06.790462959Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:06.794970 env[1130]: time="2024-12-13T14:34:06.790488337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:06.794970 env[1130]: time="2024-12-13T14:34:06.790683567Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d pid=1506 runtime=io.containerd.runc.v2 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit: BPF prog-id=58 op=LOAD Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1480 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373434613530366462386131376464373765343339373164613531 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1480 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373434613530366462386131376464373765343339373164613531 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit: BPF prog-id=59 op=LOAD Dec 13 14:34:06.816000 audit[1490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000389040 items=0 ppid=1480 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373434613530366462386131376464373765343339373164613531 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.816000 audit: BPF prog-id=60 op=LOAD Dec 13 14:34:06.816000 audit[1490]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000389088 items=0 ppid=1480 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373434613530366462386131376464373765343339373164613531 Dec 13 14:34:06.817000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:34:06.817000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { perfmon } for pid=1490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit[1490]: AVC avc: denied { bpf } for pid=1490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.817000 audit: BPF prog-id=61 op=LOAD Dec 13 14:34:06.817000 audit[1490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000389498 items=0 ppid=1480 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373434613530366462386131376464373765343339373164613531 Dec 13 14:34:06.826597 kubelet[1419]: E1213 14:34:06.826511 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:06.830008 systemd[1]: Started cri-containerd-083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d.scope. Dec 13 14:34:06.842588 env[1130]: time="2024-12-13T14:34:06.842547803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d4nmj,Uid:79f2d849-0288-42d6-9ff4-8e40dbc009a3,Namespace:kube-system,Attempt:0,} returns sandbox id \"10744a506db8a17dd77e43971da51560cbaf4d22763feef2e6253eb76c7f691b\"" Dec 13 14:34:06.847605 env[1130]: time="2024-12-13T14:34:06.847147353Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:34:06.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.853000 audit: BPF prog-id=62 op=LOAD Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1506 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333438363236366664646466323536366434623633336634376162 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1506 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333438363236366664646466323536366434623633336634376162 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.854000 audit: BPF prog-id=63 op=LOAD Dec 13 14:34:06.854000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a5370 items=0 ppid=1506 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333438363236366664646466323536366434623633336634376162 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit: BPF prog-id=64 op=LOAD Dec 13 14:34:06.855000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a53b8 items=0 ppid=1506 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333438363236366664646466323536366434623633336634376162 Dec 13 14:34:06.855000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:34:06.855000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { perfmon } for pid=1516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit[1516]: AVC avc: denied { bpf } for pid=1516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.855000 audit: BPF prog-id=65 op=LOAD Dec 13 14:34:06.855000 audit[1516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a57c8 items=0 ppid=1506 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333438363236366664646466323536366434623633336634376162 Dec 13 14:34:06.876850 env[1130]: time="2024-12-13T14:34:06.876795412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ltn7p,Uid:93ef5c03-fe72-4fb7-a36b-5c4c5cd23a42,Namespace:calico-system,Attempt:0,} returns sandbox id \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\"" Dec 13 14:34:07.826950 kubelet[1419]: E1213 14:34:07.826844 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:08.076506 kubelet[1419]: E1213 14:34:08.076158 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:08.613374 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3049158888.mount: Deactivated successfully. Dec 13 14:34:08.827473 kubelet[1419]: E1213 14:34:08.827426 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:09.672789 env[1130]: time="2024-12-13T14:34:09.672662305Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.675293 env[1130]: time="2024-12-13T14:34:09.675239842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.677200 env[1130]: time="2024-12-13T14:34:09.677153883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.678902 env[1130]: time="2024-12-13T14:34:09.678849492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.679413 env[1130]: time="2024-12-13T14:34:09.679369366Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:34:09.683285 env[1130]: time="2024-12-13T14:34:09.683166341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:34:09.686246 env[1130]: time="2024-12-13T14:34:09.686185925Z" level=info msg="CreateContainer within sandbox \"10744a506db8a17dd77e43971da51560cbaf4d22763feef2e6253eb76c7f691b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:34:09.720639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount650125668.mount: Deactivated successfully. Dec 13 14:34:09.736882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2655875339.mount: Deactivated successfully. Dec 13 14:34:09.754070 env[1130]: time="2024-12-13T14:34:09.753929043Z" level=info msg="CreateContainer within sandbox \"10744a506db8a17dd77e43971da51560cbaf4d22763feef2e6253eb76c7f691b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b92c02bfe53b0e9ef23efcfead226fdde1a77bd530ae655ca42589d7fdb5a6fa\"" Dec 13 14:34:09.756330 env[1130]: time="2024-12-13T14:34:09.756256898Z" level=info msg="StartContainer for \"b92c02bfe53b0e9ef23efcfead226fdde1a77bd530ae655ca42589d7fdb5a6fa\"" Dec 13 14:34:09.822528 systemd[1]: Started cri-containerd-b92c02bfe53b0e9ef23efcfead226fdde1a77bd530ae655ca42589d7fdb5a6fa.scope. Dec 13 14:34:09.829061 kubelet[1419]: E1213 14:34:09.828942 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.939407 kernel: kauditd_printk_skb: 133 callbacks suppressed Dec 13 14:34:09.939487 kernel: audit: type=1400 audit(1734100449.929:422): avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fabd6e697a8 items=0 ppid=1480 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.948504 kernel: audit: type=1300 audit(1734100449.929:422): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fabd6e697a8 items=0 ppid=1480 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.948574 kernel: audit: type=1327 audit(1734100449.929:422): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326330326266653533623065396566323365666366656164323236 Dec 13 14:34:09.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326330326266653533623065396566323365666366656164323236 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.957002 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.957158 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.973427 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.973477 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.978769 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.987769 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.987828 kernel: audit: type=1400 audit(1734100449.929:423): avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.929000 audit: BPF prog-id=66 op=LOAD Dec 13 14:34:09.929000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000311e88 items=0 ppid=1480 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326330326266653533623065396566323365666366656164323236 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.942000 audit: BPF prog-id=67 op=LOAD Dec 13 14:34:09.942000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000311ed8 items=0 ppid=1480 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326330326266653533623065396566323365666366656164323236 Dec 13 14:34:09.952000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:34:09.952000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.952000 audit: BPF prog-id=68 op=LOAD Dec 13 14:34:09.952000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000311f68 items=0 ppid=1480 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326330326266653533623065396566323365666366656164323236 Dec 13 14:34:10.077632 kubelet[1419]: E1213 14:34:10.077209 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:10.151000 audit[1615]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.151000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff63e521e0 a2=0 a3=7fff63e521cc items=0 ppid=1575 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:34:10.152000 audit[1616]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.152000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8b89b6e0 a2=0 a3=7ffe8b89b6cc items=0 ppid=1575 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:34:10.154000 audit[1617]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.154000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2ac34c40 a2=0 a3=7fff2ac34c2c items=0 ppid=1575 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:34:10.155000 audit[1618]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.155000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcba6298f0 a2=0 a3=7ffcba6298dc items=0 ppid=1575 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:34:10.157000 audit[1619]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.157000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf6311570 a2=0 a3=7ffdf631155c items=0 ppid=1575 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:34:10.161000 audit[1620]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.161000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc0d66d80 a2=0 a3=7ffdc0d66d6c items=0 ppid=1575 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:34:10.224477 env[1130]: time="2024-12-13T14:34:10.223036295Z" level=info msg="StartContainer for \"b92c02bfe53b0e9ef23efcfead226fdde1a77bd530ae655ca42589d7fdb5a6fa\" returns successfully" Dec 13 14:34:10.259000 audit[1622]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.259000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc2b501230 a2=0 a3=7ffc2b50121c items=0 ppid=1575 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:10.266000 audit[1624]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.266000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe886821e0 a2=0 a3=7ffe886821cc items=0 ppid=1575 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:34:10.275000 audit[1627]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.275000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6676f220 a2=0 a3=7ffd6676f20c items=0 ppid=1575 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:34:10.278000 audit[1628]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.278000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeac1fd880 a2=0 a3=7ffeac1fd86c items=0 ppid=1575 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:34:10.286000 audit[1630]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.286000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6f3d0790 a2=0 a3=7ffd6f3d077c items=0 ppid=1575 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:34:10.289000 audit[1631]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.289000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdde7ef8f0 a2=0 a3=7ffdde7ef8dc items=0 ppid=1575 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:34:10.295000 audit[1633]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.295000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe36004590 a2=0 a3=7ffe3600457c items=0 ppid=1575 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:34:10.303000 audit[1636]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.303000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefdcd9100 a2=0 a3=7ffefdcd90ec items=0 ppid=1575 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:34:10.306000 audit[1638]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.306000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeac5c28a0 a2=0 a3=7ffeac5c288c items=0 ppid=1575 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.305260 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.309394 kubelet[1419]: W1213 14:34:10.305295 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.305331 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.305760 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.309394 kubelet[1419]: W1213 14:34:10.305792 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.305825 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.306188 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.309394 kubelet[1419]: W1213 14:34:10.306211 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.306234 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.309394 kubelet[1419]: E1213 14:34:10.306555 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.310355 kubelet[1419]: W1213 14:34:10.306577 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.310355 kubelet[1419]: E1213 14:34:10.306599 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.310355 kubelet[1419]: E1213 14:34:10.307003 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.310355 kubelet[1419]: W1213 14:34:10.307025 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.310355 kubelet[1419]: E1213 14:34:10.307049 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.310355 kubelet[1419]: E1213 14:34:10.307439 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.310355 kubelet[1419]: W1213 14:34:10.307461 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.310355 kubelet[1419]: E1213 14:34:10.307487 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.310355 kubelet[1419]: E1213 14:34:10.307864 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.310355 kubelet[1419]: W1213 14:34:10.307886 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.311191 kubelet[1419]: E1213 14:34:10.307923 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.311191 kubelet[1419]: E1213 14:34:10.308236 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.311191 kubelet[1419]: W1213 14:34:10.308258 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.311191 kubelet[1419]: E1213 14:34:10.308280 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.311191 kubelet[1419]: E1213 14:34:10.308580 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.311191 kubelet[1419]: W1213 14:34:10.308601 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.311191 kubelet[1419]: E1213 14:34:10.308624 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.311000 audit[1649]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.311000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4c65fe90 a2=0 a3=7ffc4c65fe7c items=0 ppid=1575 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.311986 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.314821 kubelet[1419]: W1213 14:34:10.312015 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.312042 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.312435 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.314821 kubelet[1419]: W1213 14:34:10.312459 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.312482 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.312914 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.314821 kubelet[1419]: W1213 14:34:10.312936 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.312958 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.314821 kubelet[1419]: E1213 14:34:10.313339 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.314000 audit[1653]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.314000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc5812be0 a2=0 a3=7ffdc5812bcc items=0 ppid=1575 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:34:10.316979 kubelet[1419]: W1213 14:34:10.313368 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.316979 kubelet[1419]: E1213 14:34:10.313399 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.316979 kubelet[1419]: E1213 14:34:10.313798 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.316979 kubelet[1419]: W1213 14:34:10.313821 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.316979 kubelet[1419]: E1213 14:34:10.313843 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.316979 kubelet[1419]: E1213 14:34:10.314167 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.316979 kubelet[1419]: W1213 14:34:10.314187 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.316979 kubelet[1419]: E1213 14:34:10.314209 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.316979 kubelet[1419]: E1213 14:34:10.315568 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.316979 kubelet[1419]: W1213 14:34:10.315591 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.317593 kubelet[1419]: E1213 14:34:10.315616 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.317593 kubelet[1419]: E1213 14:34:10.316003 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.317593 kubelet[1419]: W1213 14:34:10.316025 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.317593 kubelet[1419]: E1213 14:34:10.316047 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.319055 kubelet[1419]: E1213 14:34:10.318153 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.319055 kubelet[1419]: W1213 14:34:10.318182 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.319055 kubelet[1419]: E1213 14:34:10.318207 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.319055 kubelet[1419]: E1213 14:34:10.318510 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.319055 kubelet[1419]: W1213 14:34:10.318530 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.319055 kubelet[1419]: E1213 14:34:10.318553 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.319055 kubelet[1419]: E1213 14:34:10.318909 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.319055 kubelet[1419]: W1213 14:34:10.318929 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.319055 kubelet[1419]: E1213 14:34:10.318981 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.320000 audit[1662]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.320000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1e5c9180 a2=0 a3=7ffd1e5c916c items=0 ppid=1575 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:10.332575 kubelet[1419]: E1213 14:34:10.332533 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.332000 audit[1665]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.332000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4c69b830 a2=0 a3=7fff4c69b81c items=0 ppid=1575 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:10.333371 kubelet[1419]: W1213 14:34:10.332873 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.333371 kubelet[1419]: E1213 14:34:10.332923 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.334025 kubelet[1419]: E1213 14:34:10.333996 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.334447 kubelet[1419]: W1213 14:34:10.334170 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.334447 kubelet[1419]: E1213 14:34:10.334227 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.334970 kubelet[1419]: E1213 14:34:10.334914 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.335157 kubelet[1419]: W1213 14:34:10.335119 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.335334 kubelet[1419]: E1213 14:34:10.335304 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.335836 kubelet[1419]: E1213 14:34:10.335789 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.335836 kubelet[1419]: W1213 14:34:10.335835 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.336056 kubelet[1419]: E1213 14:34:10.335877 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.336332 kubelet[1419]: E1213 14:34:10.336298 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.336332 kubelet[1419]: W1213 14:34:10.336329 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.336548 kubelet[1419]: E1213 14:34:10.336361 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.336922 kubelet[1419]: E1213 14:34:10.336847 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.336922 kubelet[1419]: W1213 14:34:10.336878 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.337158 kubelet[1419]: E1213 14:34:10.337031 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.337290 kubelet[1419]: E1213 14:34:10.337248 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.337290 kubelet[1419]: W1213 14:34:10.337282 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.337507 kubelet[1419]: E1213 14:34:10.337311 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.337812 kubelet[1419]: E1213 14:34:10.337682 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.337812 kubelet[1419]: W1213 14:34:10.337797 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.338034 kubelet[1419]: E1213 14:34:10.337830 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.338299 kubelet[1419]: E1213 14:34:10.338256 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.338299 kubelet[1419]: W1213 14:34:10.338287 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.338494 kubelet[1419]: E1213 14:34:10.338459 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.339211 kubelet[1419]: E1213 14:34:10.339140 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.339211 kubelet[1419]: W1213 14:34:10.339175 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.339211 kubelet[1419]: E1213 14:34:10.339208 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.340506 kubelet[1419]: E1213 14:34:10.339949 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.340506 kubelet[1419]: W1213 14:34:10.339984 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.340506 kubelet[1419]: E1213 14:34:10.340038 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.340506 kubelet[1419]: E1213 14:34:10.340406 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.340506 kubelet[1419]: W1213 14:34:10.340432 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.340506 kubelet[1419]: E1213 14:34:10.340456 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.345000 audit[1680]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.345000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefe9fbba0 a2=0 a3=7ffefe9fbb8c items=0 ppid=1575 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:34:10.348000 audit[1681]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.348000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde1d04c50 a2=0 a3=7ffde1d04c3c items=0 ppid=1575 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:34:10.649228 kubelet[1419]: I1213 14:34:10.648986 1419 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-d4nmj" podStartSLOduration=4.813544612 podStartE2EDuration="7.648927388s" podCreationTimestamp="2024-12-13 14:34:03 +0000 UTC" firstStartedPulling="2024-12-13 14:34:06.846408954 +0000 UTC m=+5.804128348" lastFinishedPulling="2024-12-13 14:34:09.681791689 +0000 UTC m=+8.639511124" observedRunningTime="2024-12-13 14:34:10.648618464 +0000 UTC m=+9.606337908" watchObservedRunningTime="2024-12-13 14:34:10.648927388 +0000 UTC m=+9.606646902" Dec 13 14:34:10.357000 audit[1683]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.357000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc194fd7b0 a2=0 a3=7ffc194fd79c items=0 ppid=1575 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:10.665000 audit[1688]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.665000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda9dd31b0 a2=0 a3=7ffda9dd319c items=0 ppid=1575 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:10.669000 audit[1689]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.669000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcb751d00 a2=0 a3=7fffcb751cec items=0 ppid=1575 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:34:10.675000 audit[1691]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:10.675000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb1fe8f10 a2=0 a3=7ffcb1fe8efc items=0 ppid=1575 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:34:10.724000 audit[1697]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:10.724000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff607bba30 a2=0 a3=7fff607bba1c items=0 ppid=1575 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.724000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:10.838550 kubelet[1419]: E1213 14:34:10.838469 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:10.856000 audit[1697]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:10.856000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fff607bba30 a2=0 a3=7fff607bba1c items=0 ppid=1575 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:10.915000 audit[1705]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.915000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffbabf4880 a2=0 a3=7fffbabf486c items=0 ppid=1575 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:10.925000 audit[1707]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.925000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca7f31ff0 a2=0 a3=7ffca7f31fdc items=0 ppid=1575 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:34:10.935000 audit[1710]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.935000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc55e34e80 a2=0 a3=7ffc55e34e6c items=0 ppid=1575 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:34:10.939000 audit[1711]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.939000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4a4a9960 a2=0 a3=7fff4a4a994c items=0 ppid=1575 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:34:10.947000 audit[1713]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.947000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa77de5a0 a2=0 a3=7fffa77de58c items=0 ppid=1575 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:34:10.949000 audit[1714]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.949000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfe3cd780 a2=0 a3=7ffdfe3cd76c items=0 ppid=1575 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:34:10.952000 audit[1716]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.952000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff66882e50 a2=0 a3=7fff66882e3c items=0 ppid=1575 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:34:10.957000 audit[1719]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.957000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd3014d350 a2=0 a3=7ffd3014d33c items=0 ppid=1575 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:34:10.959000 audit[1720]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.959000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5b2581f0 a2=0 a3=7ffe5b2581dc items=0 ppid=1575 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:34:10.965000 audit[1722]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.965000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2ae1df70 a2=0 a3=7ffc2ae1df5c items=0 ppid=1575 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:34:10.968000 audit[1723]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.968000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbbff6e70 a2=0 a3=7ffdbbff6e5c items=0 ppid=1575 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:34:10.971000 audit[1725]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.971000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0da4c9a0 a2=0 a3=7ffe0da4c98c items=0 ppid=1575 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:10.976000 audit[1728]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.976000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc60e4300 a2=0 a3=7ffcc60e42ec items=0 ppid=1575 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:34:10.984000 audit[1731]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.984000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1ec18750 a2=0 a3=7ffe1ec1873c items=0 ppid=1575 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:34:10.988000 audit[1732]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.988000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd63448850 a2=0 a3=7ffd6344883c items=0 ppid=1575 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:34:10.994000 audit[1734]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.994000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffee98bc8c0 a2=0 a3=7ffee98bc8ac items=0 ppid=1575 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:10.999000 audit[1737]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:10.999000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffecdfc98e0 a2=0 a3=7ffecdfc98cc items=0 ppid=1575 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:11.001000 audit[1738]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:11.001000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb13c7570 a2=0 a3=7ffcb13c755c items=0 ppid=1575 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:34:11.008000 audit[1740]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:11.008000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffc6fb8760 a2=0 a3=7fffc6fb874c items=0 ppid=1575 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:34:11.012000 audit[1741]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:11.012000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3c0c0b70 a2=0 a3=7ffd3c0c0b5c items=0 ppid=1575 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:34:11.016000 audit[1743]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:11.016000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc08bb8b0 a2=0 a3=7fffc08bb89c items=0 ppid=1575 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:11.020000 audit[1746]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:11.020000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc83774d50 a2=0 a3=7ffc83774d3c items=0 ppid=1575 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:11.028000 audit[1748]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:34:11.028000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe0de83990 a2=0 a3=7ffe0de8397c items=0 ppid=1575 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.028000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:11.030000 audit[1748]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:34:11.030000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe0de83990 a2=0 a3=7ffe0de8397c items=0 ppid=1575 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.030000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:11.330091 kubelet[1419]: E1213 14:34:11.330050 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.330383 kubelet[1419]: W1213 14:34:11.330350 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.330551 kubelet[1419]: E1213 14:34:11.330519 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.331137 kubelet[1419]: E1213 14:34:11.331111 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.331308 kubelet[1419]: W1213 14:34:11.331281 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.331454 kubelet[1419]: E1213 14:34:11.331428 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.332173 kubelet[1419]: E1213 14:34:11.332135 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.332361 kubelet[1419]: W1213 14:34:11.332331 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.332520 kubelet[1419]: E1213 14:34:11.332491 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.333177 kubelet[1419]: E1213 14:34:11.333150 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.333358 kubelet[1419]: W1213 14:34:11.333329 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.333515 kubelet[1419]: E1213 14:34:11.333486 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.334297 kubelet[1419]: E1213 14:34:11.334264 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.334478 kubelet[1419]: W1213 14:34:11.334449 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.334636 kubelet[1419]: E1213 14:34:11.334608 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.335327 kubelet[1419]: E1213 14:34:11.335301 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.335489 kubelet[1419]: W1213 14:34:11.335463 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.335635 kubelet[1419]: E1213 14:34:11.335606 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.336280 kubelet[1419]: E1213 14:34:11.336255 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.336473 kubelet[1419]: W1213 14:34:11.336445 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.336653 kubelet[1419]: E1213 14:34:11.336624 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.337258 kubelet[1419]: E1213 14:34:11.337234 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.337416 kubelet[1419]: W1213 14:34:11.337389 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.337558 kubelet[1419]: E1213 14:34:11.337533 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.338185 kubelet[1419]: E1213 14:34:11.338159 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.338366 kubelet[1419]: W1213 14:34:11.338338 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.338528 kubelet[1419]: E1213 14:34:11.338501 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.339174 kubelet[1419]: E1213 14:34:11.339148 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.339335 kubelet[1419]: W1213 14:34:11.339309 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.339524 kubelet[1419]: E1213 14:34:11.339496 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.340121 kubelet[1419]: E1213 14:34:11.340096 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.340275 kubelet[1419]: W1213 14:34:11.340250 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.340416 kubelet[1419]: E1213 14:34:11.340390 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.341013 kubelet[1419]: E1213 14:34:11.340989 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.341172 kubelet[1419]: W1213 14:34:11.341146 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.341361 kubelet[1419]: E1213 14:34:11.341332 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.342005 kubelet[1419]: E1213 14:34:11.341981 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.342216 kubelet[1419]: W1213 14:34:11.342184 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.342449 kubelet[1419]: E1213 14:34:11.342415 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.343077 kubelet[1419]: E1213 14:34:11.343049 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.343295 kubelet[1419]: W1213 14:34:11.343252 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.343571 kubelet[1419]: E1213 14:34:11.343540 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.344212 kubelet[1419]: E1213 14:34:11.344184 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.344448 kubelet[1419]: W1213 14:34:11.344405 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.344660 kubelet[1419]: E1213 14:34:11.344628 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.345209 kubelet[1419]: E1213 14:34:11.345185 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.345382 kubelet[1419]: W1213 14:34:11.345356 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.345574 kubelet[1419]: E1213 14:34:11.345545 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.346172 kubelet[1419]: E1213 14:34:11.346146 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.346335 kubelet[1419]: W1213 14:34:11.346309 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.346546 kubelet[1419]: E1213 14:34:11.346506 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.347204 kubelet[1419]: E1213 14:34:11.347175 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.347382 kubelet[1419]: W1213 14:34:11.347354 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.347563 kubelet[1419]: E1213 14:34:11.347533 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.348284 kubelet[1419]: E1213 14:34:11.348248 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.348487 kubelet[1419]: W1213 14:34:11.348455 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.348647 kubelet[1419]: E1213 14:34:11.348619 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.349313 kubelet[1419]: E1213 14:34:11.349269 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.349514 kubelet[1419]: W1213 14:34:11.349481 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.349691 kubelet[1419]: E1213 14:34:11.349661 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.350356 kubelet[1419]: E1213 14:34:11.350331 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.350515 kubelet[1419]: W1213 14:34:11.350489 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.350656 kubelet[1419]: E1213 14:34:11.350631 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.351314 kubelet[1419]: E1213 14:34:11.351286 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.351536 kubelet[1419]: W1213 14:34:11.351492 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.351810 kubelet[1419]: E1213 14:34:11.351776 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.352384 kubelet[1419]: E1213 14:34:11.352336 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.352509 kubelet[1419]: W1213 14:34:11.352386 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.352509 kubelet[1419]: E1213 14:34:11.352437 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.352912 kubelet[1419]: E1213 14:34:11.352877 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.352912 kubelet[1419]: W1213 14:34:11.352909 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.353152 kubelet[1419]: E1213 14:34:11.352943 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.353291 kubelet[1419]: E1213 14:34:11.353246 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.353291 kubelet[1419]: W1213 14:34:11.353280 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.353468 kubelet[1419]: E1213 14:34:11.353301 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.353679 kubelet[1419]: E1213 14:34:11.353632 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.353679 kubelet[1419]: W1213 14:34:11.353665 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.353959 kubelet[1419]: E1213 14:34:11.353687 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.354585 kubelet[1419]: E1213 14:34:11.354496 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.354585 kubelet[1419]: W1213 14:34:11.354571 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.354835 kubelet[1419]: E1213 14:34:11.354600 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.355642 kubelet[1419]: E1213 14:34:11.355522 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.355642 kubelet[1419]: W1213 14:34:11.355597 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.355642 kubelet[1419]: E1213 14:34:11.355626 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.356066 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.360267 kubelet[1419]: W1213 14:34:11.356093 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.356115 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.357214 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.360267 kubelet[1419]: W1213 14:34:11.357236 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.357259 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.357890 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.360267 kubelet[1419]: W1213 14:34:11.357913 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.357937 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.360267 kubelet[1419]: E1213 14:34:11.358625 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.360987 kubelet[1419]: W1213 14:34:11.358645 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.360987 kubelet[1419]: E1213 14:34:11.358666 1419 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.839940 kubelet[1419]: E1213 14:34:11.839870 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:12.077504 kubelet[1419]: E1213 14:34:12.076596 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:12.415435 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4166747846.mount: Deactivated successfully. Dec 13 14:34:12.677072 env[1130]: time="2024-12-13T14:34:12.676598376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.681726 env[1130]: time="2024-12-13T14:34:12.681685727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.684466 env[1130]: time="2024-12-13T14:34:12.684404825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.686807 env[1130]: time="2024-12-13T14:34:12.686755024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.687341 env[1130]: time="2024-12-13T14:34:12.687313410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:34:12.693735 env[1130]: time="2024-12-13T14:34:12.693679437Z" level=info msg="CreateContainer within sandbox \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:34:12.742096 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3226811700.mount: Deactivated successfully. Dec 13 14:34:12.765442 env[1130]: time="2024-12-13T14:34:12.765351588Z" level=info msg="CreateContainer within sandbox \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea\"" Dec 13 14:34:12.767380 env[1130]: time="2024-12-13T14:34:12.767322562Z" level=info msg="StartContainer for \"5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea\"" Dec 13 14:34:12.840104 systemd[1]: Started cri-containerd-5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea.scope. Dec 13 14:34:12.840932 kubelet[1419]: E1213 14:34:12.840848 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fe0104759d8 items=0 ppid=1506 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633339303037383433653331383130643166303136653463643365 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.869000 audit: BPF prog-id=69 op=LOAD Dec 13 14:34:12.869000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000320f98 items=0 ppid=1506 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633339303037383433653331383130643166303136653463643365 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit: BPF prog-id=70 op=LOAD Dec 13 14:34:12.873000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000320fe8 items=0 ppid=1506 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633339303037383433653331383130643166303136653463643365 Dec 13 14:34:12.873000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:34:12.873000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.873000 audit: BPF prog-id=71 op=LOAD Dec 13 14:34:12.873000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000321078 items=0 ppid=1506 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633339303037383433653331383130643166303136653463643365 Dec 13 14:34:12.911877 env[1130]: time="2024-12-13T14:34:12.911822407Z" level=info msg="StartContainer for \"5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea\" returns successfully" Dec 13 14:34:12.924291 systemd[1]: cri-containerd-5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea.scope: Deactivated successfully. Dec 13 14:34:12.927000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:34:13.304389 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea-rootfs.mount: Deactivated successfully. Dec 13 14:34:13.648182 env[1130]: time="2024-12-13T14:34:13.647434053Z" level=info msg="shim disconnected" id=5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea Dec 13 14:34:13.648182 env[1130]: time="2024-12-13T14:34:13.647526127Z" level=warning msg="cleaning up after shim disconnected" id=5cc39007843e31810d1f016e4cd3e359857e8d917dd955cfa76d0c1b77029bea namespace=k8s.io Dec 13 14:34:13.648182 env[1130]: time="2024-12-13T14:34:13.647549341Z" level=info msg="cleaning up dead shim" Dec 13 14:34:13.665316 env[1130]: time="2024-12-13T14:34:13.665225422Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1834 runtime=io.containerd.runc.v2\n" Dec 13 14:34:13.841886 kubelet[1419]: E1213 14:34:13.841779 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:14.077120 kubelet[1419]: E1213 14:34:14.076948 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:14.245446 env[1130]: time="2024-12-13T14:34:14.245361328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:34:14.818838 update_engine[1124]: I1213 14:34:14.817691 1124 update_attempter.cc:509] Updating boot flags... Dec 13 14:34:14.842913 kubelet[1419]: E1213 14:34:14.842826 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:15.843195 kubelet[1419]: E1213 14:34:15.843073 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:16.076977 kubelet[1419]: E1213 14:34:16.076800 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:16.843970 kubelet[1419]: E1213 14:34:16.843832 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:17.844554 kubelet[1419]: E1213 14:34:17.844452 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:18.077330 kubelet[1419]: E1213 14:34:18.077219 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:18.844912 kubelet[1419]: E1213 14:34:18.844622 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:19.845667 kubelet[1419]: E1213 14:34:19.845601 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:20.076364 kubelet[1419]: E1213 14:34:20.076279 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:20.846346 kubelet[1419]: E1213 14:34:20.846272 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:21.849564 kubelet[1419]: E1213 14:34:21.849475 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:22.077492 kubelet[1419]: E1213 14:34:22.077400 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:22.731961 env[1130]: time="2024-12-13T14:34:22.731871522Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.734652 env[1130]: time="2024-12-13T14:34:22.734579150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.737224 env[1130]: time="2024-12-13T14:34:22.737169246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.741243 env[1130]: time="2024-12-13T14:34:22.741182812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.746697 env[1130]: time="2024-12-13T14:34:22.746629537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:34:22.750998 env[1130]: time="2024-12-13T14:34:22.750928952Z" level=info msg="CreateContainer within sandbox \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:34:22.774647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount510347657.mount: Deactivated successfully. Dec 13 14:34:22.778963 env[1130]: time="2024-12-13T14:34:22.778898592Z" level=info msg="CreateContainer within sandbox \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289\"" Dec 13 14:34:22.780134 env[1130]: time="2024-12-13T14:34:22.780016677Z" level=info msg="StartContainer for \"50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289\"" Dec 13 14:34:22.831537 kubelet[1419]: E1213 14:34:22.831433 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:22.845974 systemd[1]: Started cri-containerd-50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289.scope. Dec 13 14:34:22.852809 kubelet[1419]: E1213 14:34:22.850127 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:23.009748 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:34:23.010108 kernel: audit: type=1400 audit(1734100462.996:486): avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fce24964c08 items=0 ppid=1506 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646464336662333533646532383836343634653335306430666263 Dec 13 14:34:23.038831 kernel: audit: type=1300 audit(1734100462.996:486): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fce24964c08 items=0 ppid=1506 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.038911 kernel: audit: type=1327 audit(1734100462.996:486): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646464336662333533646532383836343634653335306430666263 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.046912 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.051262 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.054885 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.068898 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.072842 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.072894 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.080730 kernel: audit: type=1400 audit(1734100462.996:487): avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.996000 audit: BPF prog-id=72 op=LOAD Dec 13 14:34:22.996000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a84a8 items=0 ppid=1506 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646464336662333533646532383836343634653335306430666263 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.000000 audit: BPF prog-id=73 op=LOAD Dec 13 14:34:23.000000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a84f8 items=0 ppid=1506 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646464336662333533646532383836343634653335306430666263 Dec 13 14:34:23.008000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:34:23.008000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.008000 audit: BPF prog-id=74 op=LOAD Dec 13 14:34:23.008000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a8588 items=0 ppid=1506 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646464336662333533646532383836343634653335306430666263 Dec 13 14:34:23.088331 env[1130]: time="2024-12-13T14:34:23.088291811Z" level=info msg="StartContainer for \"50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289\" returns successfully" Dec 13 14:34:23.851120 kubelet[1419]: E1213 14:34:23.850990 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:24.076496 kubelet[1419]: E1213 14:34:24.076417 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:24.852526 kubelet[1419]: E1213 14:34:24.852411 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:25.474072 env[1130]: time="2024-12-13T14:34:25.473913265Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:34:25.480843 systemd[1]: cri-containerd-50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289.scope: Deactivated successfully. Dec 13 14:34:25.481469 systemd[1]: cri-containerd-50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289.scope: Consumed 1.987s CPU time. Dec 13 14:34:25.483000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:34:25.536357 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289-rootfs.mount: Deactivated successfully. Dec 13 14:34:25.563776 kubelet[1419]: I1213 14:34:25.563665 1419 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:34:25.854085 kubelet[1419]: E1213 14:34:25.853952 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:26.088185 systemd[1]: Created slice kubepods-besteffort-pode0f7ad2a_84b1_4101_a330_b8e4b5952dfe.slice. Dec 13 14:34:26.094633 env[1130]: time="2024-12-13T14:34:26.094529979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kflh5,Uid:e0f7ad2a-84b1-4101-a330-b8e4b5952dfe,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:26.394169 env[1130]: time="2024-12-13T14:34:26.394032050Z" level=info msg="shim disconnected" id=50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289 Dec 13 14:34:26.394638 env[1130]: time="2024-12-13T14:34:26.394581193Z" level=warning msg="cleaning up after shim disconnected" id=50ddd3fb353de2886464e350d0fbcf9136c48a7ca3add05585733714b3973289 namespace=k8s.io Dec 13 14:34:26.395604 env[1130]: time="2024-12-13T14:34:26.395546059Z" level=info msg="cleaning up dead shim" Dec 13 14:34:26.434936 env[1130]: time="2024-12-13T14:34:26.434871143Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1909 runtime=io.containerd.runc.v2\n" Dec 13 14:34:26.542616 env[1130]: time="2024-12-13T14:34:26.542513378Z" level=error msg="Failed to destroy network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.547747 env[1130]: time="2024-12-13T14:34:26.546049830Z" level=error msg="encountered an error cleaning up failed sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.547747 env[1130]: time="2024-12-13T14:34:26.546147012Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kflh5,Uid:e0f7ad2a-84b1-4101-a330-b8e4b5952dfe,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.547989 kubelet[1419]: E1213 14:34:26.547596 1419 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.547989 kubelet[1419]: E1213 14:34:26.547778 1419 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:26.547989 kubelet[1419]: E1213 14:34:26.547822 1419 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kflh5" Dec 13 14:34:26.546222 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef-shm.mount: Deactivated successfully. Dec 13 14:34:26.548362 kubelet[1419]: E1213 14:34:26.547905 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kflh5_calico-system(e0f7ad2a-84b1-4101-a330-b8e4b5952dfe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kflh5_calico-system(e0f7ad2a-84b1-4101-a330-b8e4b5952dfe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:26.854803 kubelet[1419]: E1213 14:34:26.854687 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:27.322599 kubelet[1419]: I1213 14:34:27.322526 1419 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:34:27.324280 env[1130]: time="2024-12-13T14:34:27.324210918Z" level=info msg="StopPodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\"" Dec 13 14:34:27.330096 env[1130]: time="2024-12-13T14:34:27.330036153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:34:27.397457 env[1130]: time="2024-12-13T14:34:27.397370331Z" level=error msg="StopPodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" failed" error="failed to destroy network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.398432 kubelet[1419]: E1213 14:34:27.398041 1419 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:34:27.398432 kubelet[1419]: E1213 14:34:27.398158 1419 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef"} Dec 13 14:34:27.398432 kubelet[1419]: E1213 14:34:27.398304 1419 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.398432 kubelet[1419]: E1213 14:34:27.398367 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kflh5" podUID="e0f7ad2a-84b1-4101-a330-b8e4b5952dfe" Dec 13 14:34:27.855301 kubelet[1419]: E1213 14:34:27.855218 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:28.856400 kubelet[1419]: E1213 14:34:28.856254 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:29.858143 kubelet[1419]: E1213 14:34:29.858037 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:30.859453 kubelet[1419]: E1213 14:34:30.859316 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:31.097954 kubelet[1419]: I1213 14:34:31.097891 1419 topology_manager.go:215] "Topology Admit Handler" podUID="c25cd243-de2a-42b5-a51b-956f9c710e5d" podNamespace="default" podName="nginx-deployment-85f456d6dd-rb8g6" Dec 13 14:34:31.112787 systemd[1]: Created slice kubepods-besteffort-podc25cd243_de2a_42b5_a51b_956f9c710e5d.slice. Dec 13 14:34:31.272549 kubelet[1419]: I1213 14:34:31.272403 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8kg2m\" (UniqueName: \"kubernetes.io/projected/c25cd243-de2a-42b5-a51b-956f9c710e5d-kube-api-access-8kg2m\") pod \"nginx-deployment-85f456d6dd-rb8g6\" (UID: \"c25cd243-de2a-42b5-a51b-956f9c710e5d\") " pod="default/nginx-deployment-85f456d6dd-rb8g6" Dec 13 14:34:31.422335 env[1130]: time="2024-12-13T14:34:31.421702382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rb8g6,Uid:c25cd243-de2a-42b5-a51b-956f9c710e5d,Namespace:default,Attempt:0,}" Dec 13 14:34:31.790471 env[1130]: time="2024-12-13T14:34:31.790424816Z" level=error msg="Failed to destroy network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:31.792278 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c-shm.mount: Deactivated successfully. Dec 13 14:34:31.793526 env[1130]: time="2024-12-13T14:34:31.793487422Z" level=error msg="encountered an error cleaning up failed sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:31.793645 env[1130]: time="2024-12-13T14:34:31.793615633Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rb8g6,Uid:c25cd243-de2a-42b5-a51b-956f9c710e5d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:31.794328 kubelet[1419]: E1213 14:34:31.793931 1419 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:31.794328 kubelet[1419]: E1213 14:34:31.793989 1419 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-rb8g6" Dec 13 14:34:31.794328 kubelet[1419]: E1213 14:34:31.794013 1419 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-rb8g6" Dec 13 14:34:31.794486 kubelet[1419]: E1213 14:34:31.794056 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-rb8g6_default(c25cd243-de2a-42b5-a51b-956f9c710e5d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-rb8g6_default(c25cd243-de2a-42b5-a51b-956f9c710e5d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-rb8g6" podUID="c25cd243-de2a-42b5-a51b-956f9c710e5d" Dec 13 14:34:31.859916 kubelet[1419]: E1213 14:34:31.859839 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:32.342773 kubelet[1419]: I1213 14:34:32.342685 1419 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:34:32.344278 env[1130]: time="2024-12-13T14:34:32.344203514Z" level=info msg="StopPodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\"" Dec 13 14:34:32.482839 env[1130]: time="2024-12-13T14:34:32.482686877Z" level=error msg="StopPodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" failed" error="failed to destroy network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:32.483401 kubelet[1419]: E1213 14:34:32.483242 1419 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:34:32.483581 kubelet[1419]: E1213 14:34:32.483484 1419 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c"} Dec 13 14:34:32.483763 kubelet[1419]: E1213 14:34:32.483665 1419 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c25cd243-de2a-42b5-a51b-956f9c710e5d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:32.483866 kubelet[1419]: E1213 14:34:32.483793 1419 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c25cd243-de2a-42b5-a51b-956f9c710e5d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-rb8g6" podUID="c25cd243-de2a-42b5-a51b-956f9c710e5d" Dec 13 14:34:32.860961 kubelet[1419]: E1213 14:34:32.860876 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:33.861944 kubelet[1419]: E1213 14:34:33.861813 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:34.862202 kubelet[1419]: E1213 14:34:34.862152 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.862943 kubelet[1419]: E1213 14:34:35.862826 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:36.864149 kubelet[1419]: E1213 14:34:36.864047 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:37.864496 kubelet[1419]: E1213 14:34:37.864437 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:38.864952 kubelet[1419]: E1213 14:34:38.864868 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:39.865556 kubelet[1419]: E1213 14:34:39.865492 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:40.268235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2495117318.mount: Deactivated successfully. Dec 13 14:34:40.340069 env[1130]: time="2024-12-13T14:34:40.340007197Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:40.346177 env[1130]: time="2024-12-13T14:34:40.346098635Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:40.350353 env[1130]: time="2024-12-13T14:34:40.349256465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:40.351751 env[1130]: time="2024-12-13T14:34:40.351725672Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:40.353192 env[1130]: time="2024-12-13T14:34:40.353109931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:34:40.386561 env[1130]: time="2024-12-13T14:34:40.386507434Z" level=info msg="CreateContainer within sandbox \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:34:40.428098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1076449525.mount: Deactivated successfully. Dec 13 14:34:40.441240 env[1130]: time="2024-12-13T14:34:40.441106046Z" level=info msg="CreateContainer within sandbox \"083486266fdddf2566d4b633f47abd52f86c2579def4dfab342cc006505d420d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678\"" Dec 13 14:34:40.443265 env[1130]: time="2024-12-13T14:34:40.443070756Z" level=info msg="StartContainer for \"768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678\"" Dec 13 14:34:40.499645 systemd[1]: Started cri-containerd-768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678.scope. Dec 13 14:34:40.559248 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:34:40.559903 kernel: audit: type=1400 audit(1734100480.546:493): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdb5804ca78 items=0 ppid=1506 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386637666664323164333831623037633632663839303230666431 Dec 13 14:34:40.576908 kernel: audit: type=1300 audit(1734100480.546:493): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdb5804ca78 items=0 ppid=1506 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.577019 kernel: audit: type=1327 audit(1734100480.546:493): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386637666664323164333831623037633632663839303230666431 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.580875 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.586817 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.591762 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.601611 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.601669 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.601745 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.610724 kernel: audit: type=1400 audit(1734100480.546:494): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.546000 audit: BPF prog-id=75 op=LOAD Dec 13 14:34:40.546000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ca218 items=0 ppid=1506 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386637666664323164333831623037633632663839303230666431 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit: BPF prog-id=76 op=LOAD Dec 13 14:34:40.558000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ca268 items=0 ppid=1506 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386637666664323164333831623037633632663839303230666431 Dec 13 14:34:40.558000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:34:40.558000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.558000 audit: BPF prog-id=77 op=LOAD Dec 13 14:34:40.558000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ca2f8 items=0 ppid=1506 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736386637666664323164333831623037633632663839303230666431 Dec 13 14:34:40.882833 kubelet[1419]: E1213 14:34:40.879015 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:40.894682 env[1130]: time="2024-12-13T14:34:40.893596090Z" level=info msg="StartContainer for \"768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678\" returns successfully" Dec 13 14:34:40.980520 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:34:40.980965 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:34:41.445388 systemd[1]: run-containerd-runc-k8s.io-768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678-runc.47kxNr.mount: Deactivated successfully. Dec 13 14:34:41.879945 kubelet[1419]: E1213 14:34:41.879851 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:42.078454 env[1130]: time="2024-12-13T14:34:42.078350555Z" level=info msg="StopPodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\"" Dec 13 14:34:42.432561 systemd[1]: run-containerd-runc-k8s.io-768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678-runc.SIeoaU.mount: Deactivated successfully. Dec 13 14:34:42.820919 kubelet[1419]: E1213 14:34:42.820862 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:42.881101 kubelet[1419]: E1213 14:34:42.880998 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:42.979000 audit[2195]: AVC avc: denied { write } for pid=2195 comm="tee" name="fd" dev="proc" ino=18428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:42.981000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=18431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:42.981000 audit[2193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1de6f9fe a2=241 a3=1b6 items=1 ppid=2164 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.979000 audit[2195]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe404329ff a2=241 a3=1b6 items=1 ppid=2167 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.979000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:34:42.979000 audit: PATH item=0 name="/dev/fd/63" inode=18419 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:42.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:42.981000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:34:42.981000 audit: PATH item=0 name="/dev/fd/63" inode=19182 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:42.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:42.995000 audit[2198]: AVC avc: denied { write } for pid=2198 comm="tee" name="fd" dev="proc" ino=19195 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:42.995000 audit[2198]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2bf0ca0f a2=241 a3=1b6 items=1 ppid=2168 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.010000 audit[2225]: AVC avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=19466 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:43.010000 audit[2225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0fd54a0e a2=241 a3=1b6 items=1 ppid=2170 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.010000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:34:43.010000 audit: PATH item=0 name="/dev/fd/63" inode=19461 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:43.010000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:43.013000 audit[2202]: AVC avc: denied { write } for pid=2202 comm="tee" name="fd" dev="proc" ino=19205 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:43.013000 audit[2202]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf6bc6a0e a2=241 a3=1b6 items=1 ppid=2163 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.013000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:34:43.013000 audit: PATH item=0 name="/dev/fd/63" inode=18423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:43.014000 audit[2200]: AVC avc: denied { write } for pid=2200 comm="tee" name="fd" dev="proc" ino=19207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:42.995000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:34:42.995000 audit: PATH item=0 name="/dev/fd/63" inode=18420 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:42.995000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:43.014000 audit[2200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9a1bba10 a2=241 a3=1b6 items=1 ppid=2171 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.014000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:34:43.014000 audit: PATH item=0 name="/dev/fd/63" inode=19189 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:43.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:43.013000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:43.021000 audit[2231]: AVC avc: denied { write } for pid=2231 comm="tee" name="fd" dev="proc" ino=19211 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:43.021000 audit[2231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1ed5fa0e a2=241 a3=1b6 items=1 ppid=2174 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.021000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:34:43.021000 audit: PATH item=0 name="/dev/fd/63" inode=19199 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:43.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.395000 audit: BPF prog-id=78 op=LOAD Dec 13 14:34:43.395000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff94d7fd10 a2=98 a3=3 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.395000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.404000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit: BPF prog-id=79 op=LOAD Dec 13 14:34:43.404000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff94d7faf0 a2=74 a3=540051 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.404000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.404000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.404000 audit: BPF prog-id=80 op=LOAD Dec 13 14:34:43.404000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff94d7fb20 a2=94 a3=2 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.404000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.404000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit: BPF prog-id=81 op=LOAD Dec 13 14:34:43.537000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff94d7f9e0 a2=40 a3=1 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.537000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.537000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:34:43.537000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.537000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff94d7fab0 a2=50 a3=7fff94d7fb90 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.537000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff94d7f9f0 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff94d7fa20 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff94d7f930 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff94d7fa40 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff94d7fa20 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff94d7fa10 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff94d7fa40 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff94d7fa20 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff94d7fa40 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff94d7fa10 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.556000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.556000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff94d7fa80 a2=28 a3=0 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff94d7f830 a2=50 a3=1 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.557000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit: BPF prog-id=82 op=LOAD Dec 13 14:34:43.557000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff94d7f830 a2=94 a3=5 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.557000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.557000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff94d7f8e0 a2=50 a3=1 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.557000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff94d7fa00 a2=4 a3=38 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.557000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.557000 audit[2254]: AVC avc: denied { confidentiality } for pid=2254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:43.557000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff94d7fa50 a2=94 a3=6 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.557000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { confidentiality } for pid=2254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:43.558000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff94d7f200 a2=94 a3=83 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.558000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.558000 audit[2254]: AVC avc: denied { confidentiality } for pid=2254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:43.558000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff94d7f200 a2=94 a3=83 items=0 ppid=2172 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.558000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit: BPF prog-id=83 op=LOAD Dec 13 14:34:43.590000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6b4c8f70 a2=98 a3=1999999999999999 items=0 ppid=2172 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.590000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:43.590000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit: BPF prog-id=84 op=LOAD Dec 13 14:34:43.590000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6b4c8e50 a2=74 a3=ffff items=0 ppid=2172 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.590000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:43.590000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.590000 audit: BPF prog-id=85 op=LOAD Dec 13 14:34:43.590000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6b4c8e90 a2=40 a3=7ffd6b4c9070 items=0 ppid=2172 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.590000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:43.590000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:34:43.754679 kubelet[1419]: I1213 14:34:43.749193 1419 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ltn7p" podStartSLOduration=7.271905687 podStartE2EDuration="40.749153506s" podCreationTimestamp="2024-12-13 14:34:03 +0000 UTC" firstStartedPulling="2024-12-13 14:34:06.878558555 +0000 UTC m=+5.836277949" lastFinishedPulling="2024-12-13 14:34:40.355806314 +0000 UTC m=+39.313525768" observedRunningTime="2024-12-13 14:34:41.428284357 +0000 UTC m=+40.386003751" watchObservedRunningTime="2024-12-13 14:34:43.749153506 +0000 UTC m=+42.706872900" Dec 13 14:34:43.760163 systemd-networkd[968]: vxlan.calico: Link UP Dec 13 14:34:43.760172 systemd-networkd[968]: vxlan.calico: Gained carrier Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit: BPF prog-id=86 op=LOAD Dec 13 14:34:43.819000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe6b9f960 a2=98 a3=ffff items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.819000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.819000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.819000 audit: BPF prog-id=87 op=LOAD Dec 13 14:34:43.819000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe6b9f770 a2=74 a3=540051 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.819000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.826000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit: BPF prog-id=88 op=LOAD Dec 13 14:34:43.826000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe6b9f7a0 a2=94 a3=2 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.826000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe6b9f670 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.826000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.826000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe6b9f6a0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe6b9f5b0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe6b9f6c0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe6b9f6a0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe6b9f690 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe6b9f6c0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe6b9f6a0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe6b9f6c0 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe6b9f690 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe6b9f700 a2=28 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.827000 audit: BPF prog-id=89 op=LOAD Dec 13 14:34:43.827000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe6b9f570 a2=40 a3=0 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.827000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffe6b9f560 a2=50 a3=2800 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffe6b9f560 a2=50 a3=2800 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit: BPF prog-id=90 op=LOAD Dec 13 14:34:43.831000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe6b9ed80 a2=94 a3=2 items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.831000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.831000 audit: BPF prog-id=91 op=LOAD Dec 13 14:34:43.831000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe6b9ee80 a2=94 a3=2d items=0 ppid=2172 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.840000 audit: BPF prog-id=92 op=LOAD Dec 13 14:34:43.840000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd3da25130 a2=98 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:43.840000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.841000 audit: BPF prog-id=93 op=LOAD Dec 13 14:34:43.841000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3da24f10 a2=74 a3=540051 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:43.843000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.844000 audit: BPF prog-id=94 op=LOAD Dec 13 14:34:43.844000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3da24f40 a2=94 a3=2 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.844000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:43.845000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:34:43.882327 kubelet[1419]: E1213 14:34:43.882040 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit: BPF prog-id=95 op=LOAD Dec 13 14:34:44.008000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3da24e00 a2=40 a3=1 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.008000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:34:44.008000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.008000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd3da24ed0 a2=50 a3=7ffd3da24fb0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.019000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.019000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3da24e10 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.019000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.019000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3da24e40 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.019000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.019000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3da24d50 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.019000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.019000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3da24e60 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3da24e40 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3da24e30 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3da24e60 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3da24e40 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3da24e60 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3da24e30 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3da24ea0 a2=28 a3=0 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd3da24c50 a2=50 a3=1 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.020000 audit: BPF prog-id=96 op=LOAD Dec 13 14:34:44.020000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd3da24c50 a2=94 a3=5 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.021000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd3da24d00 a2=50 a3=1 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd3da24e20 a2=4 a3=38 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { confidentiality } for pid=2308 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:44.021000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd3da24e70 a2=94 a3=6 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { confidentiality } for pid=2308 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:44.021000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd3da24620 a2=94 a3=83 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.021000 audit[2308]: AVC avc: denied { confidentiality } for pid=2308 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:44.021000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd3da24620 a2=94 a3=83 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.022000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.022000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3da26060 a2=10 a3=f0f1 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.022000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.022000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3da25f00 a2=10 a3=3 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.022000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.022000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3da25ea0 a2=10 a3=3 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.022000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.022000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3da25ea0 a2=10 a3=7 items=0 ppid=2172 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:44.042000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:43.742 [INFO][2128] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:43.769 [INFO][2128] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" iface="eth0" netns="/var/run/netns/cni-18c5fd8e-9cca-95ca-77dd-8debd51918c4" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:43.779 [INFO][2128] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" iface="eth0" netns="/var/run/netns/cni-18c5fd8e-9cca-95ca-77dd-8debd51918c4" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:43.850 [INFO][2128] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" iface="eth0" netns="/var/run/netns/cni-18c5fd8e-9cca-95ca-77dd-8debd51918c4" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:43.851 [INFO][2128] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:43.851 [INFO][2128] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.118 [INFO][2310] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.119 [INFO][2310] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.119 [INFO][2310] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.141 [WARNING][2310] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.141 [INFO][2310] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.144 [INFO][2310] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:44.149949 env[1130]: 2024-12-13 14:34:44.148 [INFO][2128] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:34:44.153493 systemd[1]: run-netns-cni\x2d18c5fd8e\x2d9cca\x2d95ca\x2d77dd\x2d8debd51918c4.mount: Deactivated successfully. Dec 13 14:34:44.155789 env[1130]: time="2024-12-13T14:34:44.155667915Z" level=info msg="TearDown network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" successfully" Dec 13 14:34:44.155887 env[1130]: time="2024-12-13T14:34:44.155866888Z" level=info msg="StopPodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" returns successfully" Dec 13 14:34:44.155000 audit[2338]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:44.157927 env[1130]: time="2024-12-13T14:34:44.157895747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kflh5,Uid:e0f7ad2a-84b1-4101-a330-b8e4b5952dfe,Namespace:calico-system,Attempt:1,}" Dec 13 14:34:44.155000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe5b8a3060 a2=0 a3=7ffe5b8a304c items=0 ppid=2172 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.155000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:44.184000 audit[2340]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:44.184000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc1bff7260 a2=0 a3=7ffc1bff724c items=0 ppid=2172 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.184000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:44.185000 audit[2339]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:44.185000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe6352b6f0 a2=0 a3=7ffe6352b6dc items=0 ppid=2172 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.185000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:44.200000 audit[2337]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:44.200000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe27f0cbe0 a2=0 a3=7ffe27f0cbcc items=0 ppid=2172 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:44.461818 systemd-networkd[968]: califc178262d35: Link UP Dec 13 14:34:44.467851 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califc178262d35: link becomes ready Dec 13 14:34:44.467996 systemd-networkd[968]: califc178262d35: Gained carrier Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.281 [INFO][2348] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.233-k8s-csi--node--driver--kflh5-eth0 csi-node-driver- calico-system e0f7ad2a-84b1-4101-a330-b8e4b5952dfe 1193 0 2024-12-13 14:34:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.233 csi-node-driver-kflh5 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] califc178262d35 [] []}} ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.281 [INFO][2348] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.343 [INFO][2360] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" HandleID="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.369 [INFO][2360] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" HandleID="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002845e0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.233", "pod":"csi-node-driver-kflh5", "timestamp":"2024-12-13 14:34:44.343430582 +0000 UTC"}, Hostname:"172.24.4.233", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.369 [INFO][2360] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.369 [INFO][2360] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.369 [INFO][2360] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.233' Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.375 [INFO][2360] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.395 [INFO][2360] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.407 [INFO][2360] ipam/ipam.go 489: Trying affinity for 192.168.65.128/26 host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.411 [INFO][2360] ipam/ipam.go 155: Attempting to load block cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.418 [INFO][2360] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.418 [INFO][2360] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.65.128/26 handle="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.422 [INFO][2360] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419 Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.432 [INFO][2360] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.65.128/26 handle="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.445 [INFO][2360] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.65.129/26] block=192.168.65.128/26 handle="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.445 [INFO][2360] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.65.129/26] handle="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" host="172.24.4.233" Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.445 [INFO][2360] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:44.509765 env[1130]: 2024-12-13 14:34:44.445 [INFO][2360] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.65.129/26] IPv6=[] ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" HandleID="k8s-pod-network.60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.510630 env[1130]: 2024-12-13 14:34:44.450 [INFO][2348] cni-plugin/k8s.go 386: Populated endpoint ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-csi--node--driver--kflh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe", ResourceVersion:"1193", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"", Pod:"csi-node-driver-kflh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.65.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califc178262d35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:44.510630 env[1130]: 2024-12-13 14:34:44.451 [INFO][2348] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.65.129/32] ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.510630 env[1130]: 2024-12-13 14:34:44.451 [INFO][2348] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califc178262d35 ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.510630 env[1130]: 2024-12-13 14:34:44.471 [INFO][2348] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.510630 env[1130]: 2024-12-13 14:34:44.471 [INFO][2348] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-csi--node--driver--kflh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe", ResourceVersion:"1193", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419", Pod:"csi-node-driver-kflh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.65.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califc178262d35", MAC:"ba:6d:17:78:e7:99", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:44.510630 env[1130]: 2024-12-13 14:34:44.502 [INFO][2348] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419" Namespace="calico-system" Pod="csi-node-driver-kflh5" WorkloadEndpoint="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:34:44.518000 audit[2375]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:44.518000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd347cca80 a2=0 a3=7ffd347cca6c items=0 ppid=2172 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.518000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:44.539812 env[1130]: time="2024-12-13T14:34:44.539579603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:44.539812 env[1130]: time="2024-12-13T14:34:44.539633083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:44.539812 env[1130]: time="2024-12-13T14:34:44.539647802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:44.540193 env[1130]: time="2024-12-13T14:34:44.539894905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419 pid=2388 runtime=io.containerd.runc.v2 Dec 13 14:34:44.571151 systemd[1]: Started cri-containerd-60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419.scope. Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.586000 audit: BPF prog-id=97 op=LOAD Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2388 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626530393730353531306466343363386661386261386137303330 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2388 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626530393730353531306466343363386661386261386137303330 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.587000 audit: BPF prog-id=98 op=LOAD Dec 13 14:34:44.587000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002192a0 items=0 ppid=2388 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626530393730353531306466343363386661386261386137303330 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit: BPF prog-id=99 op=LOAD Dec 13 14:34:44.591000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002192e8 items=0 ppid=2388 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626530393730353531306466343363386661386261386137303330 Dec 13 14:34:44.591000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:34:44.591000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:44.591000 audit: BPF prog-id=100 op=LOAD Dec 13 14:34:44.591000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002196f8 items=0 ppid=2388 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:44.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626530393730353531306466343363386661386261386137303330 Dec 13 14:34:44.612870 env[1130]: time="2024-12-13T14:34:44.612815686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kflh5,Uid:e0f7ad2a-84b1-4101-a330-b8e4b5952dfe,Namespace:calico-system,Attempt:1,} returns sandbox id \"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419\"" Dec 13 14:34:44.615297 env[1130]: time="2024-12-13T14:34:44.615269592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:34:44.883088 kubelet[1419]: E1213 14:34:44.882968 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:45.156046 systemd[1]: run-containerd-runc-k8s.io-60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419-runc.IE9ElS.mount: Deactivated successfully. Dec 13 14:34:45.291085 systemd-networkd[968]: vxlan.calico: Gained IPv6LL Dec 13 14:34:45.547894 systemd-networkd[968]: califc178262d35: Gained IPv6LL Dec 13 14:34:45.884094 kubelet[1419]: E1213 14:34:45.883425 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:46.849381 env[1130]: time="2024-12-13T14:34:46.849275713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.851958 env[1130]: time="2024-12-13T14:34:46.851909116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.853638 env[1130]: time="2024-12-13T14:34:46.853609709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.855385 env[1130]: time="2024-12-13T14:34:46.855352681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.855788 env[1130]: time="2024-12-13T14:34:46.855694372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:34:46.859550 env[1130]: time="2024-12-13T14:34:46.859514723Z" level=info msg="CreateContainer within sandbox \"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:34:46.884516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1951011654.mount: Deactivated successfully. Dec 13 14:34:46.886084 kubelet[1419]: E1213 14:34:46.885624 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:46.898839 env[1130]: time="2024-12-13T14:34:46.898768334Z" level=info msg="CreateContainer within sandbox \"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0831b9979f2eaab8bf9ad22247c9df45d2372ad523ab098e9a7c06077d4704dc\"" Dec 13 14:34:46.900675 env[1130]: time="2024-12-13T14:34:46.900604990Z" level=info msg="StartContainer for \"0831b9979f2eaab8bf9ad22247c9df45d2372ad523ab098e9a7c06077d4704dc\"" Dec 13 14:34:46.935860 systemd[1]: Started cri-containerd-0831b9979f2eaab8bf9ad22247c9df45d2372ad523ab098e9a7c06077d4704dc.scope. Dec 13 14:34:46.941148 systemd[1]: run-containerd-runc-k8s.io-0831b9979f2eaab8bf9ad22247c9df45d2372ad523ab098e9a7c06077d4704dc-runc.1hH4HK.mount: Deactivated successfully. Dec 13 14:34:46.986000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.989230 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 14:34:46.989314 kernel: audit: type=1400 audit(1734100486.986:620): avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.994601 kernel: audit: type=1300 audit(1734100486.986:620): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f772455b018 items=0 ppid=2388 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.986000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f772455b018 items=0 ppid=2388 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333162393937396632656161623862663961643232323437633964 Dec 13 14:34:47.004745 kernel: audit: type=1327 audit(1734100486.986:620): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333162393937396632656161623862663961643232323437633964 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.008731 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.012724 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.017803 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.021732 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.028996 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.029080 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:47.032529 kernel: audit: type=1400 audit(1734100486.990:621): avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.990000 audit: BPF prog-id=101 op=LOAD Dec 13 14:34:46.990000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000388208 items=0 ppid=2388 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333162393937396632656161623862663961643232323437633964 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit: BPF prog-id=102 op=LOAD Dec 13 14:34:46.998000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000388258 items=0 ppid=2388 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333162393937396632656161623862663961643232323437633964 Dec 13 14:34:46.998000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:34:46.998000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.998000 audit: BPF prog-id=103 op=LOAD Dec 13 14:34:46.998000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003882e8 items=0 ppid=2388 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333162393937396632656161623862663961643232323437633964 Dec 13 14:34:47.048720 env[1130]: time="2024-12-13T14:34:47.048643570Z" level=info msg="StartContainer for \"0831b9979f2eaab8bf9ad22247c9df45d2372ad523ab098e9a7c06077d4704dc\" returns successfully" Dec 13 14:34:47.051191 env[1130]: time="2024-12-13T14:34:47.051153161Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:34:47.886154 kubelet[1419]: E1213 14:34:47.886047 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:48.078980 env[1130]: time="2024-12-13T14:34:48.078914664Z" level=info msg="StopPodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\"" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.221 [INFO][2471] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.221 [INFO][2471] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" iface="eth0" netns="/var/run/netns/cni-b4a46438-b6fb-e49c-9449-a713e52ad9a1" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.221 [INFO][2471] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" iface="eth0" netns="/var/run/netns/cni-b4a46438-b6fb-e49c-9449-a713e52ad9a1" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.225 [INFO][2471] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" iface="eth0" netns="/var/run/netns/cni-b4a46438-b6fb-e49c-9449-a713e52ad9a1" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.225 [INFO][2471] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.225 [INFO][2471] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.291 [INFO][2478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.291 [INFO][2478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.292 [INFO][2478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.319 [WARNING][2478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.319 [INFO][2478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.327 [INFO][2478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:48.332151 env[1130]: 2024-12-13 14:34:48.329 [INFO][2471] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:34:48.335241 env[1130]: time="2024-12-13T14:34:48.335196286Z" level=info msg="TearDown network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" successfully" Dec 13 14:34:48.335347 env[1130]: time="2024-12-13T14:34:48.335327061Z" level=info msg="StopPodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" returns successfully" Dec 13 14:34:48.337224 systemd[1]: run-netns-cni\x2db4a46438\x2db6fb\x2de49c\x2d9449\x2da713e52ad9a1.mount: Deactivated successfully. Dec 13 14:34:48.341199 env[1130]: time="2024-12-13T14:34:48.341171701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rb8g6,Uid:c25cd243-de2a-42b5-a51b-956f9c710e5d,Namespace:default,Attempt:1,}" Dec 13 14:34:48.585524 systemd-networkd[968]: calif54875ce809: Link UP Dec 13 14:34:48.589418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:48.590346 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif54875ce809: link becomes ready Dec 13 14:34:48.589882 systemd-networkd[968]: calif54875ce809: Gained carrier Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.451 [INFO][2485] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0 nginx-deployment-85f456d6dd- default c25cd243-de2a-42b5-a51b-956f9c710e5d 1212 0 2024-12-13 14:34:31 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.233 nginx-deployment-85f456d6dd-rb8g6 eth0 default [] [] [kns.default ksa.default.default] calif54875ce809 [] []}} ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.451 [INFO][2485] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.493 [INFO][2498] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" HandleID="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.514 [INFO][2498] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" HandleID="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ee80), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.233", "pod":"nginx-deployment-85f456d6dd-rb8g6", "timestamp":"2024-12-13 14:34:48.493619133 +0000 UTC"}, Hostname:"172.24.4.233", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.514 [INFO][2498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.514 [INFO][2498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.514 [INFO][2498] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.233' Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.518 [INFO][2498] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.529 [INFO][2498] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.539 [INFO][2498] ipam/ipam.go 489: Trying affinity for 192.168.65.128/26 host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.542 [INFO][2498] ipam/ipam.go 155: Attempting to load block cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.547 [INFO][2498] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.547 [INFO][2498] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.65.128/26 handle="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.550 [INFO][2498] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0 Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.561 [INFO][2498] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.65.128/26 handle="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.580 [INFO][2498] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.65.130/26] block=192.168.65.128/26 handle="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.580 [INFO][2498] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.65.130/26] handle="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" host="172.24.4.233" Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.580 [INFO][2498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:48.676302 env[1130]: 2024-12-13 14:34:48.580 [INFO][2498] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.65.130/26] IPv6=[] ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" HandleID="k8s-pod-network.14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.680702 env[1130]: 2024-12-13 14:34:48.582 [INFO][2485] cni-plugin/k8s.go 386: Populated endpoint ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"c25cd243-de2a-42b5-a51b-956f9c710e5d", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-rb8g6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.65.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif54875ce809", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:48.680702 env[1130]: 2024-12-13 14:34:48.582 [INFO][2485] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.65.130/32] ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.680702 env[1130]: 2024-12-13 14:34:48.582 [INFO][2485] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif54875ce809 ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.680702 env[1130]: 2024-12-13 14:34:48.586 [INFO][2485] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.680702 env[1130]: 2024-12-13 14:34:48.590 [INFO][2485] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"c25cd243-de2a-42b5-a51b-956f9c710e5d", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0", Pod:"nginx-deployment-85f456d6dd-rb8g6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.65.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif54875ce809", MAC:"92:bb:d6:20:2f:fe", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:48.680702 env[1130]: 2024-12-13 14:34:48.673 [INFO][2485] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0" Namespace="default" Pod="nginx-deployment-85f456d6dd-rb8g6" WorkloadEndpoint="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:34:48.720000 audit[2518]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2518 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:48.720000 audit[2518]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffddc60610 a2=0 a3=7fffddc605fc items=0 ppid=2172 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.720000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:48.736868 env[1130]: time="2024-12-13T14:34:48.736667158Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:48.737040 env[1130]: time="2024-12-13T14:34:48.736895086Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:48.737040 env[1130]: time="2024-12-13T14:34:48.736994382Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:48.738594 env[1130]: time="2024-12-13T14:34:48.738351409Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0 pid=2525 runtime=io.containerd.runc.v2 Dec 13 14:34:48.761416 systemd[1]: Started cri-containerd-14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0.scope. Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.795000 audit: BPF prog-id=104 op=LOAD Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2525 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134353531353734646438376161326561323839633933333765393239 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2525 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134353531353734646438376161326561323839633933333765393239 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.797000 audit: BPF prog-id=105 op=LOAD Dec 13 14:34:48.797000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0004121d0 items=0 ppid=2525 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134353531353734646438376161326561323839633933333765393239 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.798000 audit: BPF prog-id=106 op=LOAD Dec 13 14:34:48.798000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000412218 items=0 ppid=2525 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134353531353734646438376161326561323839633933333765393239 Dec 13 14:34:48.799000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:34:48.799000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:48.799000 audit: BPF prog-id=107 op=LOAD Dec 13 14:34:48.799000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000412628 items=0 ppid=2525 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134353531353734646438376161326561323839633933333765393239 Dec 13 14:34:48.843255 env[1130]: time="2024-12-13T14:34:48.838159855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-rb8g6,Uid:c25cd243-de2a-42b5-a51b-956f9c710e5d,Namespace:default,Attempt:1,} returns sandbox id \"14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0\"" Dec 13 14:34:48.886500 kubelet[1419]: E1213 14:34:48.886453 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:49.170417 env[1130]: time="2024-12-13T14:34:49.169499657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:49.177639 env[1130]: time="2024-12-13T14:34:49.177559162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:49.185995 env[1130]: time="2024-12-13T14:34:49.185928049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:49.190183 env[1130]: time="2024-12-13T14:34:49.190091242Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:49.191933 env[1130]: time="2024-12-13T14:34:49.191866754Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:34:49.196692 env[1130]: time="2024-12-13T14:34:49.196646254Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:34:49.198514 env[1130]: time="2024-12-13T14:34:49.198422358Z" level=info msg="CreateContainer within sandbox \"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:34:49.241996 env[1130]: time="2024-12-13T14:34:49.241909503Z" level=info msg="CreateContainer within sandbox \"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"150578805ca0366b1a8a443cbb4b6c64e8da9f151a888495728a7ea54b7e7246\"" Dec 13 14:34:49.242949 env[1130]: time="2024-12-13T14:34:49.242880575Z" level=info msg="StartContainer for \"150578805ca0366b1a8a443cbb4b6c64e8da9f151a888495728a7ea54b7e7246\"" Dec 13 14:34:49.295664 systemd[1]: Started cri-containerd-150578805ca0366b1a8a443cbb4b6c64e8da9f151a888495728a7ea54b7e7246.scope. Dec 13 14:34:49.357000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.357000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f98633ebc68 items=0 ppid=2388 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303537383830356361303336366231613861343433636262346236 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.358000 audit: BPF prog-id=108 op=LOAD Dec 13 14:34:49.358000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00009e328 items=0 ppid=2388 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303537383830356361303336366231613861343433636262346236 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.367000 audit: BPF prog-id=109 op=LOAD Dec 13 14:34:49.367000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00009e378 items=0 ppid=2388 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303537383830356361303336366231613861343433636262346236 Dec 13 14:34:49.367000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:34:49.367000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.368000 audit: BPF prog-id=110 op=LOAD Dec 13 14:34:49.368000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00009e408 items=0 ppid=2388 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303537383830356361303336366231613861343433636262346236 Dec 13 14:34:49.417307 env[1130]: time="2024-12-13T14:34:49.417222315Z" level=info msg="StartContainer for \"150578805ca0366b1a8a443cbb4b6c64e8da9f151a888495728a7ea54b7e7246\" returns successfully" Dec 13 14:34:49.887497 kubelet[1419]: E1213 14:34:49.887388 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:49.962358 systemd-networkd[968]: calif54875ce809: Gained IPv6LL Dec 13 14:34:50.012328 kubelet[1419]: I1213 14:34:50.012267 1419 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:34:50.012328 kubelet[1419]: I1213 14:34:50.012333 1419 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:34:50.887734 kubelet[1419]: E1213 14:34:50.887671 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:51.888073 kubelet[1419]: E1213 14:34:51.887939 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:52.888628 kubelet[1419]: E1213 14:34:52.888512 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:53.551205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount648565319.mount: Deactivated successfully. Dec 13 14:34:53.889540 kubelet[1419]: E1213 14:34:53.889310 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:54.889875 kubelet[1419]: E1213 14:34:54.889796 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:55.890532 kubelet[1419]: E1213 14:34:55.890445 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:56.170252 env[1130]: time="2024-12-13T14:34:56.169331590Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:56.176796 env[1130]: time="2024-12-13T14:34:56.176654811Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:56.180919 env[1130]: time="2024-12-13T14:34:56.180807622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:56.186233 env[1130]: time="2024-12-13T14:34:56.186140930Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:56.189461 env[1130]: time="2024-12-13T14:34:56.189351343Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:34:56.196638 env[1130]: time="2024-12-13T14:34:56.196544109Z" level=info msg="CreateContainer within sandbox \"14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:34:56.234983 env[1130]: time="2024-12-13T14:34:56.234897602Z" level=info msg="CreateContainer within sandbox \"14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"1650eea8cccc939cd31896552365cd554396e2f6413c8060ce88f1067c7b9f19\"" Dec 13 14:34:56.236493 env[1130]: time="2024-12-13T14:34:56.236443111Z" level=info msg="StartContainer for \"1650eea8cccc939cd31896552365cd554396e2f6413c8060ce88f1067c7b9f19\"" Dec 13 14:34:56.291866 systemd[1]: run-containerd-runc-k8s.io-1650eea8cccc939cd31896552365cd554396e2f6413c8060ce88f1067c7b9f19-runc.CXUHdc.mount: Deactivated successfully. Dec 13 14:34:56.299405 systemd[1]: Started cri-containerd-1650eea8cccc939cd31896552365cd554396e2f6413c8060ce88f1067c7b9f19.scope. Dec 13 14:34:56.329053 kernel: kauditd_printk_skb: 136 callbacks suppressed Dec 13 14:34:56.329396 kernel: audit: type=1400 audit(1734100496.312:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.329448 kernel: audit: type=1400 audit(1734100496.312:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.336903 kernel: audit: type=1400 audit(1734100496.316:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.336980 kernel: audit: type=1400 audit(1734100496.316:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.341193 kernel: audit: type=1400 audit(1734100496.316:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.349108 kernel: audit: type=1400 audit(1734100496.316:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.349204 kernel: audit: type=1400 audit(1734100496.316:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.349234 kernel: audit: type=1400 audit(1734100496.316:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.352568 kernel: audit: type=1400 audit(1734100496.316:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.359389 kernel: audit: type=1400 audit(1734100496.326:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.326000 audit: BPF prog-id=111 op=LOAD Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2525 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:56.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353065656138636363633933396364333138393635353233363563 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2525 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:56.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353065656138636363633933396364333138393635353233363563 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.328000 audit: BPF prog-id=112 op=LOAD Dec 13 14:34:56.328000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009f6a0 items=0 ppid=2525 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:56.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353065656138636363633933396364333138393635353233363563 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.331000 audit: BPF prog-id=113 op=LOAD Dec 13 14:34:56.331000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009f6e8 items=0 ppid=2525 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:56.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353065656138636363633933396364333138393635353233363563 Dec 13 14:34:56.335000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:34:56.335000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:56.335000 audit: BPF prog-id=114 op=LOAD Dec 13 14:34:56.335000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009faf8 items=0 ppid=2525 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:56.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353065656138636363633933396364333138393635353233363563 Dec 13 14:34:56.436989 env[1130]: time="2024-12-13T14:34:56.436640163Z" level=info msg="StartContainer for \"1650eea8cccc939cd31896552365cd554396e2f6413c8060ce88f1067c7b9f19\" returns successfully" Dec 13 14:34:56.501816 kubelet[1419]: I1213 14:34:56.500265 1419 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kflh5" podStartSLOduration=48.920348151 podStartE2EDuration="53.500223545s" podCreationTimestamp="2024-12-13 14:34:03 +0000 UTC" firstStartedPulling="2024-12-13 14:34:44.614926749 +0000 UTC m=+43.572646153" lastFinishedPulling="2024-12-13 14:34:49.194802103 +0000 UTC m=+48.152521547" observedRunningTime="2024-12-13 14:34:50.434380811 +0000 UTC m=+49.392100265" watchObservedRunningTime="2024-12-13 14:34:56.500223545 +0000 UTC m=+55.457943019" Dec 13 14:34:56.501816 kubelet[1419]: I1213 14:34:56.500643 1419 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-rb8g6" podStartSLOduration=18.153282756 podStartE2EDuration="25.500628946s" podCreationTimestamp="2024-12-13 14:34:31 +0000 UTC" firstStartedPulling="2024-12-13 14:34:48.844925022 +0000 UTC m=+47.802644416" lastFinishedPulling="2024-12-13 14:34:56.192271162 +0000 UTC m=+55.149990606" observedRunningTime="2024-12-13 14:34:56.500062512 +0000 UTC m=+55.457781976" watchObservedRunningTime="2024-12-13 14:34:56.500628946 +0000 UTC m=+55.458348420" Dec 13 14:34:56.891222 kubelet[1419]: E1213 14:34:56.891119 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:57.892110 kubelet[1419]: E1213 14:34:57.892037 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:58.893391 kubelet[1419]: E1213 14:34:58.893239 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:59.894359 kubelet[1419]: E1213 14:34:59.894235 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:00.895377 kubelet[1419]: E1213 14:35:00.895303 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:01.896845 kubelet[1419]: E1213 14:35:01.896782 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:02.821813 kubelet[1419]: E1213 14:35:02.821701 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:02.869287 env[1130]: time="2024-12-13T14:35:02.869143994Z" level=info msg="StopPodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\"" Dec 13 14:35:02.899790 kubelet[1419]: E1213 14:35:02.898928 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:02.987 [WARNING][2701] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-csi--node--driver--kflh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419", Pod:"csi-node-driver-kflh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.65.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califc178262d35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:02.991 [INFO][2701] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:02.991 [INFO][2701] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" iface="eth0" netns="" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:02.991 [INFO][2701] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:02.991 [INFO][2701] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.063 [INFO][2708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.063 [INFO][2708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.064 [INFO][2708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.079 [WARNING][2708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.080 [INFO][2708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.088 [INFO][2708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:03.093918 env[1130]: 2024-12-13 14:35:03.091 [INFO][2701] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.093918 env[1130]: time="2024-12-13T14:35:03.093535530Z" level=info msg="TearDown network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" successfully" Dec 13 14:35:03.093918 env[1130]: time="2024-12-13T14:35:03.093574223Z" level=info msg="StopPodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" returns successfully" Dec 13 14:35:03.094551 env[1130]: time="2024-12-13T14:35:03.094320924Z" level=info msg="RemovePodSandbox for \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\"" Dec 13 14:35:03.094551 env[1130]: time="2024-12-13T14:35:03.094353205Z" level=info msg="Forcibly stopping sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\"" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.145 [WARNING][2731] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-csi--node--driver--kflh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0f7ad2a-84b1-4101-a330-b8e4b5952dfe", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"60be09705510df43c8fa8ba8a7030a484c7a18913e11dc1fa605fc48768e4419", Pod:"csi-node-driver-kflh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.65.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califc178262d35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.145 [INFO][2731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.145 [INFO][2731] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" iface="eth0" netns="" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.145 [INFO][2731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.145 [INFO][2731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.175 [INFO][2737] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.175 [INFO][2737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.176 [INFO][2737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.191 [WARNING][2737] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.191 [INFO][2737] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" HandleID="k8s-pod-network.bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Workload="172.24.4.233-k8s-csi--node--driver--kflh5-eth0" Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.194 [INFO][2737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:03.197461 env[1130]: 2024-12-13 14:35:03.195 [INFO][2731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef" Dec 13 14:35:03.198261 env[1130]: time="2024-12-13T14:35:03.198167421Z" level=info msg="TearDown network for sandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" successfully" Dec 13 14:35:03.201510 env[1130]: time="2024-12-13T14:35:03.201468434Z" level=info msg="RemovePodSandbox \"bb92631eba7d6afdcbbe91a27c2b54cb1ce3b889fd0f2857591a44b00e3327ef\" returns successfully" Dec 13 14:35:03.202417 env[1130]: time="2024-12-13T14:35:03.202376687Z" level=info msg="StopPodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\"" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.266 [WARNING][2756] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"c25cd243-de2a-42b5-a51b-956f9c710e5d", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0", Pod:"nginx-deployment-85f456d6dd-rb8g6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.65.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif54875ce809", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.266 [INFO][2756] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.266 [INFO][2756] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" iface="eth0" netns="" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.266 [INFO][2756] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.266 [INFO][2756] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.292 [INFO][2764] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.292 [INFO][2764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.292 [INFO][2764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.306 [WARNING][2764] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.306 [INFO][2764] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.309 [INFO][2764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:03.313015 env[1130]: 2024-12-13 14:35:03.310 [INFO][2756] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.315460 env[1130]: time="2024-12-13T14:35:03.315395312Z" level=info msg="TearDown network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" successfully" Dec 13 14:35:03.315613 env[1130]: time="2024-12-13T14:35:03.315583084Z" level=info msg="StopPodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" returns successfully" Dec 13 14:35:03.316656 env[1130]: time="2024-12-13T14:35:03.316606965Z" level=info msg="RemovePodSandbox for \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\"" Dec 13 14:35:03.316849 env[1130]: time="2024-12-13T14:35:03.316659424Z" level=info msg="Forcibly stopping sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\"" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.377 [WARNING][2784] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"c25cd243-de2a-42b5-a51b-956f9c710e5d", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"14551574dd87aa2ea289c9337e929fd6627b338c349405840f0bf4073ac4afc0", Pod:"nginx-deployment-85f456d6dd-rb8g6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.65.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif54875ce809", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.377 [INFO][2784] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.377 [INFO][2784] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" iface="eth0" netns="" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.377 [INFO][2784] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.377 [INFO][2784] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.411 [INFO][2790] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.411 [INFO][2790] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.411 [INFO][2790] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.420 [WARNING][2790] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.420 [INFO][2790] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" HandleID="k8s-pod-network.45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Workload="172.24.4.233-k8s-nginx--deployment--85f456d6dd--rb8g6-eth0" Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.422 [INFO][2790] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:03.429174 env[1130]: 2024-12-13 14:35:03.425 [INFO][2784] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c" Dec 13 14:35:03.429174 env[1130]: time="2024-12-13T14:35:03.427928335Z" level=info msg="TearDown network for sandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" successfully" Dec 13 14:35:03.432233 env[1130]: time="2024-12-13T14:35:03.432199850Z" level=info msg="RemovePodSandbox \"45badf5dd1fd5417e7d717d9f59ca418b867e6b994d7a6544d78aa7784961a7c\" returns successfully" Dec 13 14:35:03.899553 kubelet[1419]: E1213 14:35:03.899474 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:04.900442 kubelet[1419]: E1213 14:35:04.900374 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:05.901699 kubelet[1419]: E1213 14:35:05.901558 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:06.902686 kubelet[1419]: E1213 14:35:06.902577 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:07.903884 kubelet[1419]: E1213 14:35:07.903803 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:08.905514 kubelet[1419]: E1213 14:35:08.905406 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:09.660000 audit[2806]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.664527 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:35:09.664683 kernel: audit: type=1325 audit(1734100509.660:669): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.660000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd4b3219c0 a2=0 a3=7ffd4b3219ac items=0 ppid=1575 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.671766 kernel: audit: type=1300 audit(1734100509.660:669): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd4b3219c0 a2=0 a3=7ffd4b3219ac items=0 ppid=1575 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.690769 kernel: audit: type=1327 audit(1734100509.660:669): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.683000 audit[2806]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.683000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd4b3219c0 a2=0 a3=0 items=0 ppid=1575 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.708922 kernel: audit: type=1325 audit(1734100509.683:670): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.709066 kernel: audit: type=1300 audit(1734100509.683:670): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd4b3219c0 a2=0 a3=0 items=0 ppid=1575 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.715602 kernel: audit: type=1327 audit(1734100509.683:670): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.721000 audit[2810]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.721000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc2cc23260 a2=0 a3=7ffc2cc2324c items=0 ppid=1575 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.742355 kernel: audit: type=1325 audit(1734100509.721:671): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.742496 kernel: audit: type=1300 audit(1734100509.721:671): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc2cc23260 a2=0 a3=7ffc2cc2324c items=0 ppid=1575 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.748437 kernel: audit: type=1327 audit(1734100509.721:671): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.749000 audit[2810]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.757781 kernel: audit: type=1325 audit(1734100509.749:672): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.749000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc2cc23260 a2=0 a3=0 items=0 ppid=1575 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.758445 kubelet[1419]: I1213 14:35:09.758345 1419 topology_manager.go:215] "Topology Admit Handler" podUID="0960aff0-830e-44d2-9823-dcb4120a9c88" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:35:09.770807 systemd[1]: Created slice kubepods-besteffort-pod0960aff0_830e_44d2_9823_dcb4120a9c88.slice. Dec 13 14:35:09.849236 kubelet[1419]: I1213 14:35:09.849074 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0960aff0-830e-44d2-9823-dcb4120a9c88-data\") pod \"nfs-server-provisioner-0\" (UID: \"0960aff0-830e-44d2-9823-dcb4120a9c88\") " pod="default/nfs-server-provisioner-0" Dec 13 14:35:09.849236 kubelet[1419]: I1213 14:35:09.849188 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xvsgl\" (UniqueName: \"kubernetes.io/projected/0960aff0-830e-44d2-9823-dcb4120a9c88-kube-api-access-xvsgl\") pod \"nfs-server-provisioner-0\" (UID: \"0960aff0-830e-44d2-9823-dcb4120a9c88\") " pod="default/nfs-server-provisioner-0" Dec 13 14:35:09.906382 kubelet[1419]: E1213 14:35:09.906247 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:10.078349 env[1130]: time="2024-12-13T14:35:10.078266445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0960aff0-830e-44d2-9823-dcb4120a9c88,Namespace:default,Attempt:0,}" Dec 13 14:35:10.443999 systemd-networkd[968]: cali60e51b789ff: Link UP Dec 13 14:35:10.451922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:35:10.452122 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:35:10.454069 systemd-networkd[968]: cali60e51b789ff: Gained carrier Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.188 [INFO][2813] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.233-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0960aff0-830e-44d2-9823-dcb4120a9c88 1297 0 2024-12-13 14:35:09 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.233 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.188 [INFO][2813] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.239 [INFO][2825] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" HandleID="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Workload="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.260 [INFO][2825] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" HandleID="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Workload="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318a50), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.233", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:35:10.239885461 +0000 UTC"}, Hostname:"172.24.4.233", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.260 [INFO][2825] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.260 [INFO][2825] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.260 [INFO][2825] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.233' Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.263 [INFO][2825] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.279 [INFO][2825] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.288 [INFO][2825] ipam/ipam.go 489: Trying affinity for 192.168.65.128/26 host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.292 [INFO][2825] ipam/ipam.go 155: Attempting to load block cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.297 [INFO][2825] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.297 [INFO][2825] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.65.128/26 handle="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.301 [INFO][2825] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.406 [INFO][2825] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.65.128/26 handle="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.427 [INFO][2825] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.65.131/26] block=192.168.65.128/26 handle="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.427 [INFO][2825] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.65.131/26] handle="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" host="172.24.4.233" Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.427 [INFO][2825] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:10.506115 env[1130]: 2024-12-13 14:35:10.427 [INFO][2825] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.65.131/26] IPv6=[] ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" HandleID="k8s-pod-network.2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Workload="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.509890 env[1130]: 2024-12-13 14:35:10.431 [INFO][2813] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0960aff0-830e-44d2-9823-dcb4120a9c88", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.65.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:10.509890 env[1130]: 2024-12-13 14:35:10.432 [INFO][2813] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.65.131/32] ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.509890 env[1130]: 2024-12-13 14:35:10.432 [INFO][2813] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.509890 env[1130]: 2024-12-13 14:35:10.456 [INFO][2813] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.511359 env[1130]: 2024-12-13 14:35:10.458 [INFO][2813] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0960aff0-830e-44d2-9823-dcb4120a9c88", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.65.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"36:41:b6:30:c5:05", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:10.511359 env[1130]: 2024-12-13 14:35:10.499 [INFO][2813] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.233-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:35:10.547000 audit[2847]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:10.547000 audit[2847]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7fff429fd2e0 a2=0 a3=7fff429fd2cc items=0 ppid=2172 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:10.562581 env[1130]: time="2024-12-13T14:35:10.562446424Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:10.562581 env[1130]: time="2024-12-13T14:35:10.562499324Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:10.562581 env[1130]: time="2024-12-13T14:35:10.562522397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:10.563829 env[1130]: time="2024-12-13T14:35:10.563188325Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b pid=2856 runtime=io.containerd.runc.v2 Dec 13 14:35:10.590021 systemd[1]: Started cri-containerd-2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b.scope. Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.612000 audit: BPF prog-id=115 op=LOAD Dec 13 14:35:10.614000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.614000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356332663232323366353866303039366464363137323936393935 Dec 13 14:35:10.614000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.614000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356332663232323366353866303039366464363137323936393935 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.615000 audit: BPF prog-id=116 op=LOAD Dec 13 14:35:10.615000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cbdc0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356332663232323366353866303039366464363137323936393935 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.616000 audit: BPF prog-id=117 op=LOAD Dec 13 14:35:10.616000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cbe08 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356332663232323366353866303039366464363137323936393935 Dec 13 14:35:10.616000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:35:10.617000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.617000 audit: BPF prog-id=118 op=LOAD Dec 13 14:35:10.617000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000342218 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356332663232323366353866303039366464363137323936393935 Dec 13 14:35:10.657623 env[1130]: time="2024-12-13T14:35:10.657562842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0960aff0-830e-44d2-9823-dcb4120a9c88,Namespace:default,Attempt:0,} returns sandbox id \"2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b\"" Dec 13 14:35:10.660003 env[1130]: time="2024-12-13T14:35:10.659911275Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:35:10.906944 kubelet[1419]: E1213 14:35:10.906875 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:11.908673 kubelet[1419]: E1213 14:35:11.908603 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:12.518963 systemd-networkd[968]: cali60e51b789ff: Gained IPv6LL Dec 13 14:35:12.909628 kubelet[1419]: E1213 14:35:12.909525 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:13.910534 kubelet[1419]: E1213 14:35:13.910477 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:14.911431 kubelet[1419]: E1213 14:35:14.911375 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:15.109140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2977281190.mount: Deactivated successfully. Dec 13 14:35:15.912255 kubelet[1419]: E1213 14:35:15.912204 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:16.913481 kubelet[1419]: E1213 14:35:16.913384 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:17.913814 kubelet[1419]: E1213 14:35:17.913683 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:18.914848 kubelet[1419]: E1213 14:35:18.914775 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:19.320410 env[1130]: time="2024-12-13T14:35:19.320333912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:19.323756 env[1130]: time="2024-12-13T14:35:19.323668270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:19.326918 env[1130]: time="2024-12-13T14:35:19.326881118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:19.330858 env[1130]: time="2024-12-13T14:35:19.330826576Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:19.332732 env[1130]: time="2024-12-13T14:35:19.332684048Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:35:19.338294 env[1130]: time="2024-12-13T14:35:19.338249442Z" level=info msg="CreateContainer within sandbox \"2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:35:19.373010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2171632733.mount: Deactivated successfully. Dec 13 14:35:19.401095 env[1130]: time="2024-12-13T14:35:19.400975859Z" level=info msg="CreateContainer within sandbox \"2b5c2f2223f58f0096dd61729699512baab344990e67ffa6a8b8a28b5e16e49b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"79d23d7a94bc4a27bd9482572000ff4e8617870642538823f7e6ab1f693a976d\"" Dec 13 14:35:19.402433 env[1130]: time="2024-12-13T14:35:19.402338477Z" level=info msg="StartContainer for \"79d23d7a94bc4a27bd9482572000ff4e8617870642538823f7e6ab1f693a976d\"" Dec 13 14:35:19.447861 systemd[1]: Started cri-containerd-79d23d7a94bc4a27bd9482572000ff4e8617870642538823f7e6ab1f693a976d.scope. Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.477033 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:35:19.477124 kernel: audit: type=1400 audit(1734100519.474:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483507 kernel: audit: type=1400 audit(1734100519.474:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.486733 kernel: audit: type=1400 audit(1734100519.474:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.486815 kernel: audit: type=1400 audit(1734100519.474:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.493410 kernel: audit: type=1400 audit(1734100519.474:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.493484 kernel: audit: type=1400 audit(1734100519.474:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.500745 kernel: audit: type=1400 audit(1734100519.474:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.501026 kernel: audit: type=1400 audit(1734100519.474:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.504567 kernel: audit: type=1400 audit(1734100519.474:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.511492 kernel: audit: type=1400 audit(1734100519.475:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.475000 audit: BPF prog-id=119 op=LOAD Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2856 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739643233643761393462633461323762643934383235373230303066 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2856 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739643233643761393462633461323762643934383235373230303066 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.480000 audit: BPF prog-id=120 op=LOAD Dec 13 14:35:19.480000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ba1b0 items=0 ppid=2856 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739643233643761393462633461323762643934383235373230303066 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.483000 audit: BPF prog-id=121 op=LOAD Dec 13 14:35:19.483000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ba1f8 items=0 ppid=2856 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739643233643761393462633461323762643934383235373230303066 Dec 13 14:35:19.489000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:35:19.489000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:19.489000 audit: BPF prog-id=122 op=LOAD Dec 13 14:35:19.489000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ba608 items=0 ppid=2856 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739643233643761393462633461323762643934383235373230303066 Dec 13 14:35:19.531860 env[1130]: time="2024-12-13T14:35:19.531818465Z" level=info msg="StartContainer for \"79d23d7a94bc4a27bd9482572000ff4e8617870642538823f7e6ab1f693a976d\" returns successfully" Dec 13 14:35:19.578000 audit[2928]: AVC avc: denied { search } for pid=2928 comm="rpcbind" name="crypto" dev="proc" ino=21444 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:35:19.578000 audit[2928]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd3b64030c0 a2=0 a3=0 items=0 ppid=2911 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 key=(null) Dec 13 14:35:19.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:35:19.624000 audit[2933]: AVC avc: denied { search } for pid=2933 comm="dbus-daemon" name="crypto" dev="proc" ino=21444 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:35:19.624000 audit[2933]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbd25e2a0c0 a2=0 a3=0 items=0 ppid=2911 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 key=(null) Dec 13 14:35:19.624000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:35:19.630616 kubelet[1419]: I1213 14:35:19.630560 1419 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.954258609 podStartE2EDuration="10.63052443s" podCreationTimestamp="2024-12-13 14:35:09 +0000 UTC" firstStartedPulling="2024-12-13 14:35:10.659210652 +0000 UTC m=+69.616930046" lastFinishedPulling="2024-12-13 14:35:19.335476473 +0000 UTC m=+78.293195867" observedRunningTime="2024-12-13 14:35:19.626755563 +0000 UTC m=+78.584474957" watchObservedRunningTime="2024-12-13 14:35:19.63052443 +0000 UTC m=+78.588243824" Dec 13 14:35:19.630000 audit[2934]: AVC avc: denied { watch } for pid=2934 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538696 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c101,c704 tclass=dir permissive=0 Dec 13 14:35:19.630000 audit[2934]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=556706501040 a2=2c8 a3=7ffd90f4906c items=0 ppid=2911 pid=2934 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 key=(null) Dec 13 14:35:19.630000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:35:19.634000 audit[2935]: AVC avc: denied { read } for pid=2935 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22563 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:35:19.634000 audit[2935]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f48561bf320 a1=80000 a2=d a3=7ffe71000200 items=0 ppid=2911 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 key=(null) Dec 13 14:35:19.634000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:35:19.636000 audit[2935]: AVC avc: denied { search } for pid=2935 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21444 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:35:19.636000 audit[2935]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f48557130c0 a2=0 a3=0 items=0 ppid=2911 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c704 key=(null) Dec 13 14:35:19.636000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:35:19.670000 audit[2940]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.670000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff22053950 a2=0 a3=7fff2205393c items=0 ppid=1575 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.676000 audit[2940]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.676000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff22053950 a2=0 a3=7fff2205393c items=0 ppid=1575 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.915516 kubelet[1419]: E1213 14:35:19.915294 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:20.916383 kubelet[1419]: E1213 14:35:20.916306 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:21.918159 kubelet[1419]: E1213 14:35:21.918088 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:22.821791 kubelet[1419]: E1213 14:35:22.821687 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:22.918742 kubelet[1419]: E1213 14:35:22.918564 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:23.918870 kubelet[1419]: E1213 14:35:23.918799 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:24.921058 kubelet[1419]: E1213 14:35:24.920959 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:25.922859 kubelet[1419]: E1213 14:35:25.922777 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:26.923966 kubelet[1419]: E1213 14:35:26.923841 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:27.924394 kubelet[1419]: E1213 14:35:27.924328 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:28.925654 kubelet[1419]: E1213 14:35:28.925588 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:28.980125 systemd[1]: run-containerd-runc-k8s.io-768f7ffd21d381b07c62f89020fd12726ee21b3f452a0289c68abaaf32eea678-runc.oV5AV2.mount: Deactivated successfully. Dec 13 14:35:29.927774 kubelet[1419]: E1213 14:35:29.927628 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:30.928267 kubelet[1419]: E1213 14:35:30.928176 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:31.929241 kubelet[1419]: E1213 14:35:31.929105 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:32.929832 kubelet[1419]: E1213 14:35:32.929651 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:33.931330 kubelet[1419]: E1213 14:35:33.931172 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:34.932247 kubelet[1419]: E1213 14:35:34.932163 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:35.933666 kubelet[1419]: E1213 14:35:35.933554 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:36.934041 kubelet[1419]: E1213 14:35:36.933957 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:37.935180 kubelet[1419]: E1213 14:35:37.935044 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:38.935999 kubelet[1419]: E1213 14:35:38.935893 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:39.936941 kubelet[1419]: E1213 14:35:39.936825 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:40.938123 kubelet[1419]: E1213 14:35:40.937996 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:41.938575 kubelet[1419]: E1213 14:35:41.938436 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:42.820882 kubelet[1419]: E1213 14:35:42.820810 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:42.939217 kubelet[1419]: E1213 14:35:42.939107 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:43.846072 kubelet[1419]: I1213 14:35:43.845994 1419 topology_manager.go:215] "Topology Admit Handler" podUID="c79e5e20-f66d-42f5-8f57-d5e3b6975048" podNamespace="default" podName="test-pod-1" Dec 13 14:35:43.860606 systemd[1]: Created slice kubepods-besteffort-podc79e5e20_f66d_42f5_8f57_d5e3b6975048.slice. Dec 13 14:35:43.940095 kubelet[1419]: E1213 14:35:43.939983 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:43.981528 kubelet[1419]: I1213 14:35:43.981472 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-plxw5\" (UniqueName: \"kubernetes.io/projected/c79e5e20-f66d-42f5-8f57-d5e3b6975048-kube-api-access-plxw5\") pod \"test-pod-1\" (UID: \"c79e5e20-f66d-42f5-8f57-d5e3b6975048\") " pod="default/test-pod-1" Dec 13 14:35:43.981946 kubelet[1419]: I1213 14:35:43.981900 1419 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-95741c9f-df6f-412a-ba80-df9dbd08eb08\" (UniqueName: \"kubernetes.io/nfs/c79e5e20-f66d-42f5-8f57-d5e3b6975048-pvc-95741c9f-df6f-412a-ba80-df9dbd08eb08\") pod \"test-pod-1\" (UID: \"c79e5e20-f66d-42f5-8f57-d5e3b6975048\") " pod="default/test-pod-1" Dec 13 14:35:44.221987 kernel: Failed to create system directory netfs Dec 13 14:35:44.222225 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:35:44.222323 kernel: audit: type=1400 audit(1734100544.194:717): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.222353 kernel: Failed to create system directory netfs Dec 13 14:35:44.222374 kernel: Failed to create system directory netfs Dec 13 14:35:44.239532 kernel: Failed to create system directory netfs Dec 13 14:35:44.239746 kernel: audit: type=1400 audit(1734100544.194:717): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.194000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.194000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.194000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.194000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.250205 kernel: audit: type=1400 audit(1734100544.194:717): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.250327 kernel: audit: type=1400 audit(1734100544.194:717): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.250382 kernel: audit: type=1300 audit(1734100544.194:717): arch=c000003e syscall=175 success=yes exit=0 a0=55d2464895e0 a1=153bc a2=55d22e5762b0 a3=5 items=0 ppid=993 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.194000 audit[2995]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d2464895e0 a1=153bc a2=55d22e5762b0 a3=5 items=0 ppid=993 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.194000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:44.257069 kernel: audit: type=1327 audit(1734100544.194:717): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.270495 kernel: Failed to create system directory fscache Dec 13 14:35:44.270549 kernel: audit: type=1400 audit(1734100544.260:718): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.270576 kernel: Failed to create system directory fscache Dec 13 14:35:44.270597 kernel: audit: type=1400 audit(1734100544.260:718): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.275206 kernel: Failed to create system directory fscache Dec 13 14:35:44.275254 kernel: audit: type=1400 audit(1734100544.260:718): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.280741 kernel: Failed to create system directory fscache Dec 13 14:35:44.280791 kernel: audit: type=1400 audit(1734100544.260:718): avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.284916 kernel: Failed to create system directory fscache Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.286566 kernel: Failed to create system directory fscache Dec 13 14:35:44.286610 kernel: Failed to create system directory fscache Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.288523 kernel: Failed to create system directory fscache Dec 13 14:35:44.288561 kernel: Failed to create system directory fscache Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.294038 kernel: Failed to create system directory fscache Dec 13 14:35:44.294090 kernel: Failed to create system directory fscache Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.295809 kernel: Failed to create system directory fscache Dec 13 14:35:44.295849 kernel: Failed to create system directory fscache Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.296734 kernel: Failed to create system directory fscache Dec 13 14:35:44.260000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.300274 kernel: FS-Cache: Loaded Dec 13 14:35:44.260000 audit[2995]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d24669e9c0 a1=4c0fc a2=55d22e5762b0 a3=5 items=0 ppid=993 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.260000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.364272 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.364366 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.365413 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.366448 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.367442 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.368542 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.369609 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.370611 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.371767 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.373748 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.373790 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.374755 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.375747 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.376737 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.377764 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.378749 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.380777 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.380822 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.382063 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.383058 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.384157 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.385226 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.386242 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.387231 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.388245 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.389265 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.390349 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.391443 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.392509 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.393562 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.394618 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.395756 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.397781 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.397934 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.398969 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.400055 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.401118 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.402164 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.403241 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.404337 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.405403 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.406414 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.407408 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.408509 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.409568 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.410647 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.411772 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.413767 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.413811 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.414882 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.415947 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.417064 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.418123 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.419164 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.420236 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.421334 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.422387 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.423431 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.424495 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.425527 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.426557 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.427590 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.428649 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.429725 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.431758 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.431806 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.432842 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.433958 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.435049 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.436099 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.437156 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.438151 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.439225 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.440315 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.441429 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.442513 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.443670 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.445725 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.445765 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.446749 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.447810 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.448860 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.449845 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.450857 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.451903 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.452889 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.453862 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.454834 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.455877 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.456942 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.457994 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.459047 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.460111 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.461167 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.462223 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.463272 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.464327 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.465357 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.466355 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.467432 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.468450 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.469476 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.470553 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.471633 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.472776 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.474796 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.474844 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.475893 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.476960 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.477999 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.479056 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.480136 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.481192 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.482265 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.483368 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.484431 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.485484 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.486538 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.487610 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.488744 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.490765 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.490814 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.493530 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.497148 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.345000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.502246 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.502286 kernel: Failed to create system directory sunrpc Dec 13 14:35:44.532449 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:35:44.532621 kernel: RPC: Registered udp transport module. Dec 13 14:35:44.532650 kernel: RPC: Registered tcp transport module. Dec 13 14:35:44.534745 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:35:44.345000 audit[2995]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d2466eaad0 a1=1a7f1c a2=55d22e5762b0 a3=5 items=6 ppid=993 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.345000 audit: CWD cwd="/" Dec 13 14:35:44.345000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:44.345000 audit: PATH item=1 name=(null) inode=22450 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:44.345000 audit: PATH item=2 name=(null) inode=22450 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:44.345000 audit: PATH item=3 name=(null) inode=22451 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:44.345000 audit: PATH item=4 name=(null) inode=22450 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:44.345000 audit: PATH item=5 name=(null) inode=22452 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:44.345000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.600942 kernel: Failed to create system directory nfs Dec 13 14:35:44.601156 kernel: Failed to create system directory nfs Dec 13 14:35:44.601273 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.605987 kernel: Failed to create system directory nfs Dec 13 14:35:44.606137 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.611105 kernel: Failed to create system directory nfs Dec 13 14:35:44.611235 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.615343 kernel: Failed to create system directory nfs Dec 13 14:35:44.615504 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.619665 kernel: Failed to create system directory nfs Dec 13 14:35:44.619802 kernel: Failed to create system directory nfs Dec 13 14:35:44.619850 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.620194 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.621311 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.622369 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.624608 kernel: Failed to create system directory nfs Dec 13 14:35:44.624764 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.625755 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.626789 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.628962 kernel: Failed to create system directory nfs Dec 13 14:35:44.629078 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.630060 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.631096 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.632246 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.634407 kernel: Failed to create system directory nfs Dec 13 14:35:44.634551 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.635519 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.636652 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.637799 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.639975 kernel: Failed to create system directory nfs Dec 13 14:35:44.640105 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.641034 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.643172 kernel: Failed to create system directory nfs Dec 13 14:35:44.643277 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.644287 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.645346 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.646211 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.647148 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.648077 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.648982 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.649879 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.650830 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.652690 kernel: Failed to create system directory nfs Dec 13 14:35:44.652844 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.658502 kernel: Failed to create system directory nfs Dec 13 14:35:44.658638 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.659656 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.660700 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.661793 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.663980 kernel: Failed to create system directory nfs Dec 13 14:35:44.664041 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.666135 kernel: Failed to create system directory nfs Dec 13 14:35:44.666183 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.668320 kernel: Failed to create system directory nfs Dec 13 14:35:44.668372 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.670470 kernel: Failed to create system directory nfs Dec 13 14:35:44.670518 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.672628 kernel: Failed to create system directory nfs Dec 13 14:35:44.672727 kernel: Failed to create system directory nfs Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.584000 audit[2995]: AVC avc: denied { confidentiality } for pid=2995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.674805 kernel: Failed to create system directory nfs Dec 13 14:35:44.711500 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:35:44.584000 audit[2995]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d24690b700 a1=16e97c a2=55d22e5762b0 a3=5 items=0 ppid=993 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.584000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.778984 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.783952 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.784064 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.784110 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.786422 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.786481 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.788503 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.788561 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.789481 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.790601 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.792575 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.792626 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.794554 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.794639 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.795512 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.796614 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.798726 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.798776 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.800676 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.800772 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.802738 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.802831 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.803696 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.804769 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.806735 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.806794 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.808865 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.808919 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.810961 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.811057 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.813056 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.813116 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.815123 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.815183 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.817235 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.817338 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.819377 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.819477 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.821569 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.821631 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.823757 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.823816 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.825822 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.825871 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.827866 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.827925 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.829853 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.829978 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.830941 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.833301 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.833397 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.834355 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.837223 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.837323 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.839373 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.839476 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.841474 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.841523 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.842954 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.844930 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.844993 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.847033 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.847082 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.849199 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.849295 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.851346 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.851447 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.853467 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.853525 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.855651 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.855741 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.857851 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.857912 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.858910 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.861009 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.861108 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.863072 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.863130 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.865149 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.865208 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.867214 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.867295 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.869214 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.869336 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.870292 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.872315 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.872401 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.874309 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.874358 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.876336 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.876385 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.878409 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.878458 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.752000 audit[3000]: AVC avc: denied { confidentiality } for pid=3000 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:44.880376 kernel: Failed to create system directory nfs4 Dec 13 14:35:44.941218 kubelet[1419]: E1213 14:35:44.941116 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:45.051326 kernel: NFS: Registering the id_resolver key type Dec 13 14:35:45.051560 kernel: Key type id_resolver registered Dec 13 14:35:45.051609 kernel: Key type id_legacy registered Dec 13 14:35:44.752000 audit[3000]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff22f3c0010 a1=208de4 a2=557ab9fbf2b0 a3=5 items=0 ppid=993 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.752000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.080042 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.084276 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.084319 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.085604 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.086760 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.088830 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.088875 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.089935 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.090969 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.092077 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.093263 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.094357 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.095403 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.096447 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.097543 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.098564 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.099628 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.101785 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.101828 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.102846 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.103905 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.105007 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.106054 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.107094 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.108259 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.109342 kernel: Failed to create system directory rpcgss Dec 13 14:35:45.072000 audit[3001]: AVC avc: denied { confidentiality } for pid=3001 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:45.072000 audit[3001]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4a7055f010 a1=70af4 a2=5555c33402b0 a3=5 items=0 ppid=993 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.072000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:35:45.179261 nfsidmap[3011]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 14:35:45.190442 nfsidmap[3012]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 14:35:45.205000 audit[1208]: AVC avc: denied { watch_reads } for pid=1208 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:45.205000 audit[1208]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5643a72137e0 a2=10 a3=cbfdd74e081e7dd1 items=0 ppid=1 pid=1208 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:35:45.205000 audit[1208]: AVC avc: denied { watch_reads } for pid=1208 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:45.205000 audit[1208]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5643a72137e0 a2=10 a3=cbfdd74e081e7dd1 items=0 ppid=1 pid=1208 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:35:45.205000 audit[1208]: AVC avc: denied { watch_reads } for pid=1208 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:45.205000 audit[1208]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5643a72137e0 a2=10 a3=cbfdd74e081e7dd1 items=0 ppid=1 pid=1208 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:35:45.206000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:45.207000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:45.207000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:35:45.373784 env[1130]: time="2024-12-13T14:35:45.368440059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c79e5e20-f66d-42f5-8f57-d5e3b6975048,Namespace:default,Attempt:0,}" Dec 13 14:35:45.853397 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:35:45.854779 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:35:45.858428 systemd-networkd[968]: cali5ec59c6bf6e: Link UP Dec 13 14:35:45.861187 systemd-networkd[968]: cali5ec59c6bf6e: Gained carrier Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.640 [INFO][3013] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.233-k8s-test--pod--1-eth0 default c79e5e20-f66d-42f5-8f57-d5e3b6975048 1398 0 2024-12-13 14:35:13 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.233 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.641 [INFO][3013] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.720 [INFO][3025] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" HandleID="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Workload="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.748 [INFO][3025] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" HandleID="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Workload="172.24.4.233-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00035cdb0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.233", "pod":"test-pod-1", "timestamp":"2024-12-13 14:35:45.72065933 +0000 UTC"}, Hostname:"172.24.4.233", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.748 [INFO][3025] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.748 [INFO][3025] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.748 [INFO][3025] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.233' Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.752 [INFO][3025] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.763 [INFO][3025] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.784 [INFO][3025] ipam/ipam.go 489: Trying affinity for 192.168.65.128/26 host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.790 [INFO][3025] ipam/ipam.go 155: Attempting to load block cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.798 [INFO][3025] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.65.128/26 host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.798 [INFO][3025] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.65.128/26 handle="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.803 [INFO][3025] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.814 [INFO][3025] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.65.128/26 handle="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.830 [INFO][3025] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.65.132/26] block=192.168.65.128/26 handle="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.830 [INFO][3025] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.65.132/26] handle="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" host="172.24.4.233" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.831 [INFO][3025] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.831 [INFO][3025] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.65.132/26] IPv6=[] ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" HandleID="k8s-pod-network.3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Workload="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.909371 env[1130]: 2024-12-13 14:35:45.837 [INFO][3013] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c79e5e20-f66d-42f5-8f57-d5e3b6975048", ResourceVersion:"1398", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.65.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:45.910936 env[1130]: 2024-12-13 14:35:45.838 [INFO][3013] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.65.132/32] ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.910936 env[1130]: 2024-12-13 14:35:45.838 [INFO][3013] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.910936 env[1130]: 2024-12-13 14:35:45.863 [INFO][3013] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.910936 env[1130]: 2024-12-13 14:35:45.867 [INFO][3013] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.233-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c79e5e20-f66d-42f5-8f57-d5e3b6975048", ResourceVersion:"1398", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 35, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.233", ContainerID:"3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.65.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"5a:aa:1a:ef:4e:0e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:35:45.910936 env[1130]: 2024-12-13 14:35:45.894 [INFO][3013] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.233-k8s-test--pod--1-eth0" Dec 13 14:35:45.928080 env[1130]: time="2024-12-13T14:35:45.927996527Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:45.928320 env[1130]: time="2024-12-13T14:35:45.928294598Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:45.928462 env[1130]: time="2024-12-13T14:35:45.928438860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:45.928736 env[1130]: time="2024-12-13T14:35:45.928681155Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff pid=3052 runtime=io.containerd.runc.v2 Dec 13 14:35:45.935000 audit[3057]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:35:45.935000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffffc90ee30 a2=0 a3=7ffffc90ee1c items=0 ppid=2172 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.935000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:35:45.941959 kubelet[1419]: E1213 14:35:45.941909 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:45.959355 systemd[1]: Started cri-containerd-3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff.scope. Dec 13 14:35:45.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.990000 audit: BPF prog-id=123 op=LOAD Dec 13 14:35:45.991000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.991000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3052 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346232393663663535636661653963303066633233373530333835 Dec 13 14:35:45.991000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.991000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3052 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346232393663663535636661653963303066633233373530333835 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.992000 audit: BPF prog-id=124 op=LOAD Dec 13 14:35:45.992000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a290 items=0 ppid=3052 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346232393663663535636661653963303066633233373530333835 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit: BPF prog-id=125 op=LOAD Dec 13 14:35:45.993000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028a2d8 items=0 ppid=3052 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346232393663663535636661653963303066633233373530333835 Dec 13 14:35:45.993000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:35:45.993000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:45.993000 audit: BPF prog-id=126 op=LOAD Dec 13 14:35:45.993000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028a6e8 items=0 ppid=3052 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:45.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346232393663663535636661653963303066633233373530333835 Dec 13 14:35:46.036606 env[1130]: time="2024-12-13T14:35:46.036537246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c79e5e20-f66d-42f5-8f57-d5e3b6975048,Namespace:default,Attempt:0,} returns sandbox id \"3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff\"" Dec 13 14:35:46.039572 env[1130]: time="2024-12-13T14:35:46.039479209Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:35:46.673278 env[1130]: time="2024-12-13T14:35:46.673124822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:46.676907 env[1130]: time="2024-12-13T14:35:46.676828297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:46.681389 env[1130]: time="2024-12-13T14:35:46.681324664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:46.685655 env[1130]: time="2024-12-13T14:35:46.685577272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:35:46.687966 env[1130]: time="2024-12-13T14:35:46.687905540Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:35:46.694827 env[1130]: time="2024-12-13T14:35:46.694750313Z" level=info msg="CreateContainer within sandbox \"3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:35:46.730265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount624738232.mount: Deactivated successfully. Dec 13 14:35:46.750173 env[1130]: time="2024-12-13T14:35:46.750059441Z" level=info msg="CreateContainer within sandbox \"3d4b296cf55cfae9c00fc237503858254690bbb3302af9db18bb8d19eafbb1ff\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a6546110bcf41f76b0e9672842fb6b5d228061e2ade75516efb115e553265d40\"" Dec 13 14:35:46.752219 env[1130]: time="2024-12-13T14:35:46.752129204Z" level=info msg="StartContainer for \"a6546110bcf41f76b0e9672842fb6b5d228061e2ade75516efb115e553265d40\"" Dec 13 14:35:46.787901 systemd[1]: Started cri-containerd-a6546110bcf41f76b0e9672842fb6b5d228061e2ade75516efb115e553265d40.scope. Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.811000 audit: BPF prog-id=127 op=LOAD Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3052 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136353436313130626366343166373662306539363732383432666236 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3052 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136353436313130626366343166373662306539363732383432666236 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit: BPF prog-id=128 op=LOAD Dec 13 14:35:46.812000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00032fd40 items=0 ppid=3052 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136353436313130626366343166373662306539363732383432666236 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit: BPF prog-id=129 op=LOAD Dec 13 14:35:46.812000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00032fd88 items=0 ppid=3052 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136353436313130626366343166373662306539363732383432666236 Dec 13 14:35:46.812000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:35:46.812000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:46.812000 audit: BPF prog-id=130 op=LOAD Dec 13 14:35:46.812000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000398198 items=0 ppid=3052 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136353436313130626366343166373662306539363732383432666236 Dec 13 14:35:46.881872 env[1130]: time="2024-12-13T14:35:46.881787891Z" level=info msg="StartContainer for \"a6546110bcf41f76b0e9672842fb6b5d228061e2ade75516efb115e553265d40\" returns successfully" Dec 13 14:35:46.943148 kubelet[1419]: E1213 14:35:46.942948 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:47.118774 systemd-networkd[968]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:35:47.742548 kubelet[1419]: I1213 14:35:47.742429 1419 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.090037159 podStartE2EDuration="34.742395284s" podCreationTimestamp="2024-12-13 14:35:13 +0000 UTC" firstStartedPulling="2024-12-13 14:35:46.038870895 +0000 UTC m=+104.996590299" lastFinishedPulling="2024-12-13 14:35:46.69122898 +0000 UTC m=+105.648948424" observedRunningTime="2024-12-13 14:35:47.742152077 +0000 UTC m=+106.699871521" watchObservedRunningTime="2024-12-13 14:35:47.742395284 +0000 UTC m=+106.700114769" Dec 13 14:35:47.943469 kubelet[1419]: E1213 14:35:47.943312 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:48.943688 kubelet[1419]: E1213 14:35:48.943529 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:49.944241 kubelet[1419]: E1213 14:35:49.944135 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:50.944659 kubelet[1419]: E1213 14:35:50.944591 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:51.945529 kubelet[1419]: E1213 14:35:51.945456 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:52.946260 kubelet[1419]: E1213 14:35:52.946125 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:53.946502 kubelet[1419]: E1213 14:35:53.946419 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:54.947291 kubelet[1419]: E1213 14:35:54.947130 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:55.947646 kubelet[1419]: E1213 14:35:55.947591 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:56.949598 kubelet[1419]: E1213 14:35:56.949469 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:57.950452 kubelet[1419]: E1213 14:35:57.950341 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"