Dec 13 14:54:56.961297 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:54:56.961346 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:54:56.961374 kernel: BIOS-provided physical RAM map: Dec 13 14:54:56.961393 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:54:56.961410 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:54:56.961426 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:54:56.961446 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 14:54:56.961493 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 14:54:56.961513 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:54:56.961529 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:54:56.961546 kernel: NX (Execute Disable) protection: active Dec 13 14:54:56.961562 kernel: SMBIOS 2.8 present. Dec 13 14:54:56.961579 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 14:54:56.961596 kernel: Hypervisor detected: KVM Dec 13 14:54:56.961616 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:54:56.961637 kernel: kvm-clock: cpu 0, msr 1719a001, primary cpu clock Dec 13 14:54:56.961655 kernel: kvm-clock: using sched offset of 5178123687 cycles Dec 13 14:54:56.962748 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:54:56.962775 kernel: tsc: Detected 1996.249 MHz processor Dec 13 14:54:56.962790 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:54:56.962805 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:54:56.962819 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 14:54:56.962833 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:54:56.962853 kernel: ACPI: Early table checksum verification disabled Dec 13 14:54:56.962867 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 14:54:56.962881 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:54:56.962895 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:54:56.962909 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:54:56.962923 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 14:54:56.962936 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:54:56.962950 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:54:56.962963 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 14:54:56.962979 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 14:54:56.962993 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 14:54:56.963006 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 14:54:56.963020 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 14:54:56.963033 kernel: No NUMA configuration found Dec 13 14:54:56.963047 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 14:54:56.963060 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 14:54:56.963075 kernel: Zone ranges: Dec 13 14:54:56.963095 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:54:56.963109 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 14:54:56.963123 kernel: Normal empty Dec 13 14:54:56.963138 kernel: Movable zone start for each node Dec 13 14:54:56.963152 kernel: Early memory node ranges Dec 13 14:54:56.963167 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:54:56.963183 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 14:54:56.963198 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 14:54:56.963212 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:54:56.963226 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:54:56.963240 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 14:54:56.963254 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:54:56.963268 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:54:56.963282 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:54:56.963297 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:54:56.963313 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:54:56.963328 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:54:56.963342 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:54:56.963356 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:54:56.963370 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:54:56.963384 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:54:56.963398 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 14:54:56.963412 kernel: Booting paravirtualized kernel on KVM Dec 13 14:54:56.963427 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:54:56.963441 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:54:56.963459 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:54:56.963473 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:54:56.963486 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:54:56.963500 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 13 14:54:56.963515 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 14:54:56.963529 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 14:54:56.963543 kernel: Policy zone: DMA32 Dec 13 14:54:56.963559 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:54:56.963577 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:54:56.963592 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:54:56.963606 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:54:56.963620 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:54:56.963636 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123076K reserved, 0K cma-reserved) Dec 13 14:54:56.963650 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:54:56.963664 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:54:56.963702 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:54:56.963720 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:54:56.963735 kernel: rcu: RCU event tracing is enabled. Dec 13 14:54:56.963750 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:54:56.963765 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:54:56.963779 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:54:56.963793 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:54:56.963807 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:54:56.963822 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:54:56.963836 kernel: Console: colour VGA+ 80x25 Dec 13 14:54:56.963852 kernel: printk: console [tty0] enabled Dec 13 14:54:56.963867 kernel: printk: console [ttyS0] enabled Dec 13 14:54:56.963881 kernel: ACPI: Core revision 20210730 Dec 13 14:54:56.963895 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:54:56.963909 kernel: x2apic enabled Dec 13 14:54:56.963923 kernel: Switched APIC routing to physical x2apic. Dec 13 14:54:56.963937 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:54:56.963951 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:54:56.963966 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 14:54:56.963980 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 14:54:56.963998 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 14:54:56.964012 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:54:56.964027 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:54:56.964041 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:54:56.964056 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:54:56.964070 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:54:56.964084 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 14:54:56.964098 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:54:56.964113 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:54:56.964130 kernel: LSM: Security Framework initializing Dec 13 14:54:56.964144 kernel: SELinux: Initializing. Dec 13 14:54:56.964158 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:54:56.964172 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:54:56.964187 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 14:54:56.964202 kernel: Performance Events: AMD PMU driver. Dec 13 14:54:56.964216 kernel: ... version: 0 Dec 13 14:54:56.964229 kernel: ... bit width: 48 Dec 13 14:54:56.964244 kernel: ... generic registers: 4 Dec 13 14:54:56.964269 kernel: ... value mask: 0000ffffffffffff Dec 13 14:54:56.964284 kernel: ... max period: 00007fffffffffff Dec 13 14:54:56.964301 kernel: ... fixed-purpose events: 0 Dec 13 14:54:56.964316 kernel: ... event mask: 000000000000000f Dec 13 14:54:56.964330 kernel: signal: max sigframe size: 1440 Dec 13 14:54:56.964345 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:54:56.964360 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:54:56.964375 kernel: x86: Booting SMP configuration: Dec 13 14:54:56.964392 kernel: .... node #0, CPUs: #1 Dec 13 14:54:56.964407 kernel: kvm-clock: cpu 1, msr 1719a041, secondary cpu clock Dec 13 14:54:56.964422 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 13 14:54:56.964437 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:54:56.964451 kernel: smpboot: Max logical packages: 2 Dec 13 14:54:56.964466 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 14:54:56.964481 kernel: devtmpfs: initialized Dec 13 14:54:56.964496 kernel: x86/mm: Memory block size: 128MB Dec 13 14:54:56.964511 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:54:56.964528 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:54:56.964543 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:54:56.964558 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:54:56.964573 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:54:56.964588 kernel: audit: type=2000 audit(1734101696.311:1): state=initialized audit_enabled=0 res=1 Dec 13 14:54:56.964603 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:54:56.964618 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:54:56.964632 kernel: cpuidle: using governor menu Dec 13 14:54:56.964647 kernel: ACPI: bus type PCI registered Dec 13 14:54:56.964665 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:54:56.967713 kernel: dca service started, version 1.12.1 Dec 13 14:54:56.967726 kernel: PCI: Using configuration type 1 for base access Dec 13 14:54:56.967735 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:54:56.967745 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:54:56.967753 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:54:56.967762 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:54:56.967771 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:54:56.967779 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:54:56.967792 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:54:56.967800 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:54:56.967809 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:54:56.967817 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:54:56.967826 kernel: ACPI: Interpreter enabled Dec 13 14:54:56.967834 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:54:56.967843 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:54:56.967852 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:54:56.967861 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 14:54:56.967871 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:54:56.968018 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:54:56.968108 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:54:56.968123 kernel: acpiphp: Slot [3] registered Dec 13 14:54:56.968132 kernel: acpiphp: Slot [4] registered Dec 13 14:54:56.968140 kernel: acpiphp: Slot [5] registered Dec 13 14:54:56.968149 kernel: acpiphp: Slot [6] registered Dec 13 14:54:56.968160 kernel: acpiphp: Slot [7] registered Dec 13 14:54:56.968168 kernel: acpiphp: Slot [8] registered Dec 13 14:54:56.968177 kernel: acpiphp: Slot [9] registered Dec 13 14:54:56.968185 kernel: acpiphp: Slot [10] registered Dec 13 14:54:56.968193 kernel: acpiphp: Slot [11] registered Dec 13 14:54:56.968202 kernel: acpiphp: Slot [12] registered Dec 13 14:54:56.968210 kernel: acpiphp: Slot [13] registered Dec 13 14:54:56.968219 kernel: acpiphp: Slot [14] registered Dec 13 14:54:56.968227 kernel: acpiphp: Slot [15] registered Dec 13 14:54:56.968236 kernel: acpiphp: Slot [16] registered Dec 13 14:54:56.968246 kernel: acpiphp: Slot [17] registered Dec 13 14:54:56.968255 kernel: acpiphp: Slot [18] registered Dec 13 14:54:56.968263 kernel: acpiphp: Slot [19] registered Dec 13 14:54:56.968272 kernel: acpiphp: Slot [20] registered Dec 13 14:54:56.968280 kernel: acpiphp: Slot [21] registered Dec 13 14:54:56.968288 kernel: acpiphp: Slot [22] registered Dec 13 14:54:56.968297 kernel: acpiphp: Slot [23] registered Dec 13 14:54:56.968305 kernel: acpiphp: Slot [24] registered Dec 13 14:54:56.968313 kernel: acpiphp: Slot [25] registered Dec 13 14:54:56.968324 kernel: acpiphp: Slot [26] registered Dec 13 14:54:56.968332 kernel: acpiphp: Slot [27] registered Dec 13 14:54:56.968341 kernel: acpiphp: Slot [28] registered Dec 13 14:54:56.968350 kernel: acpiphp: Slot [29] registered Dec 13 14:54:56.968359 kernel: acpiphp: Slot [30] registered Dec 13 14:54:56.968367 kernel: acpiphp: Slot [31] registered Dec 13 14:54:56.968374 kernel: PCI host bridge to bus 0000:00 Dec 13 14:54:56.968460 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:54:56.968533 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:54:56.968610 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:54:56.968699 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:54:56.968774 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 14:54:56.968845 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:54:56.968941 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:54:56.969030 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:54:56.969126 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 14:54:56.969210 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 14:54:56.969294 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:54:56.969375 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:54:56.969470 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:54:56.969562 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:54:56.969660 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:54:56.971797 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 14:54:56.971885 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 14:54:56.971984 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 14:54:56.972068 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 14:54:56.972159 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 14:54:56.972244 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 14:54:56.972334 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 14:54:56.972421 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:54:56.972512 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:54:56.972597 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 14:54:56.972725 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 14:54:56.972812 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 14:54:56.972892 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 14:54:56.972984 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:54:56.973065 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:54:56.973146 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 14:54:56.973226 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 14:54:56.973312 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 14:54:56.973394 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 14:54:56.973487 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 14:54:56.973587 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:54:56.973690 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 14:54:56.973785 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 14:54:56.973798 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:54:56.973807 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:54:56.973815 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:54:56.973824 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:54:56.973833 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:54:56.973844 kernel: iommu: Default domain type: Translated Dec 13 14:54:56.973853 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:54:56.973940 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 14:54:56.974027 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:54:56.974114 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 14:54:56.974126 kernel: vgaarb: loaded Dec 13 14:54:56.974135 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:54:56.974144 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:54:56.974152 kernel: PTP clock support registered Dec 13 14:54:56.974164 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:54:56.974173 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:54:56.974182 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:54:56.974190 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 14:54:56.974198 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:54:56.974207 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:54:56.974216 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:54:56.974224 kernel: pnp: PnP ACPI init Dec 13 14:54:56.974320 kernel: pnp 00:03: [dma 2] Dec 13 14:54:56.974336 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:54:56.974346 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:54:56.974355 kernel: NET: Registered PF_INET protocol family Dec 13 14:54:56.974363 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:54:56.974372 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:54:56.974381 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:54:56.974390 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:54:56.974399 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:54:56.974411 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:54:56.974419 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:54:56.974427 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:54:56.974435 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:54:56.974443 kernel: NET: Registered PF_XDP protocol family Dec 13 14:54:56.974518 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:54:56.974594 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:54:56.974668 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:54:56.974771 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:54:56.974852 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 14:54:56.974938 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 14:54:56.975022 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:54:56.975107 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:54:56.975118 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:54:56.975126 kernel: Initialise system trusted keyrings Dec 13 14:54:56.975135 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:54:56.975145 kernel: Key type asymmetric registered Dec 13 14:54:56.975153 kernel: Asymmetric key parser 'x509' registered Dec 13 14:54:56.975161 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:54:56.975169 kernel: io scheduler mq-deadline registered Dec 13 14:54:56.975177 kernel: io scheduler kyber registered Dec 13 14:54:56.975185 kernel: io scheduler bfq registered Dec 13 14:54:56.975193 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:54:56.975202 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 14:54:56.975210 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:54:56.975218 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:54:56.975228 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:54:56.975236 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:54:56.975244 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:54:56.975252 kernel: random: crng init done Dec 13 14:54:56.975260 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:54:56.975268 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:54:56.975276 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:54:56.975367 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:54:56.975384 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:54:56.975461 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:54:56.975537 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:54:56 UTC (1734101696) Dec 13 14:54:56.975612 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 14:54:56.975624 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:54:56.975632 kernel: Segment Routing with IPv6 Dec 13 14:54:56.975640 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:54:56.975649 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:54:56.975657 kernel: Key type dns_resolver registered Dec 13 14:54:56.975668 kernel: IPI shorthand broadcast: enabled Dec 13 14:54:56.978721 kernel: sched_clock: Marking stable (742956232, 118141522)->(884964271, -23866517) Dec 13 14:54:56.978734 kernel: registered taskstats version 1 Dec 13 14:54:56.978743 kernel: Loading compiled-in X.509 certificates Dec 13 14:54:56.978751 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:54:56.978759 kernel: Key type .fscrypt registered Dec 13 14:54:56.978767 kernel: Key type fscrypt-provisioning registered Dec 13 14:54:56.978776 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:54:56.978787 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:54:56.978796 kernel: ima: No architecture policies found Dec 13 14:54:56.978804 kernel: clk: Disabling unused clocks Dec 13 14:54:56.978812 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:54:56.978820 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:54:56.978828 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:54:56.978836 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:54:56.978844 kernel: Run /init as init process Dec 13 14:54:56.978852 kernel: with arguments: Dec 13 14:54:56.978862 kernel: /init Dec 13 14:54:56.978870 kernel: with environment: Dec 13 14:54:56.978877 kernel: HOME=/ Dec 13 14:54:56.978886 kernel: TERM=linux Dec 13 14:54:56.978894 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:54:56.978905 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:54:56.978916 systemd[1]: Detected virtualization kvm. Dec 13 14:54:56.978926 systemd[1]: Detected architecture x86-64. Dec 13 14:54:56.978936 systemd[1]: Running in initrd. Dec 13 14:54:56.978944 systemd[1]: No hostname configured, using default hostname. Dec 13 14:54:56.978953 systemd[1]: Hostname set to . Dec 13 14:54:56.978962 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:54:56.978971 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:54:56.978980 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:54:56.978988 systemd[1]: Reached target cryptsetup.target. Dec 13 14:54:56.978997 systemd[1]: Reached target paths.target. Dec 13 14:54:56.979006 systemd[1]: Reached target slices.target. Dec 13 14:54:56.979015 systemd[1]: Reached target swap.target. Dec 13 14:54:56.979023 systemd[1]: Reached target timers.target. Dec 13 14:54:56.979032 systemd[1]: Listening on iscsid.socket. Dec 13 14:54:56.979041 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:54:56.979050 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:54:56.979058 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:54:56.979068 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:54:56.979077 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:54:56.979086 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:54:56.979094 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:54:56.979103 systemd[1]: Reached target sockets.target. Dec 13 14:54:56.979120 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:54:56.979131 systemd[1]: Finished network-cleanup.service. Dec 13 14:54:56.979141 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:54:56.979150 systemd[1]: Starting systemd-journald.service... Dec 13 14:54:56.979159 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:54:56.979167 systemd[1]: Starting systemd-resolved.service... Dec 13 14:54:56.979176 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:54:56.979185 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:54:56.979194 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:54:56.979207 systemd-journald[186]: Journal started Dec 13 14:54:56.979269 systemd-journald[186]: Runtime Journal (/run/log/journal/3a57c5c44f484573badf78aa23adf789) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:54:56.943215 systemd-modules-load[187]: Inserted module 'overlay' Dec 13 14:54:57.004026 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:54:56.990225 systemd-resolved[188]: Positive Trust Anchors: Dec 13 14:54:57.011572 systemd[1]: Started systemd-journald.service. Dec 13 14:54:57.011592 kernel: audit: type=1130 audit(1734101697.003:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.011606 kernel: Bridge firewalling registered Dec 13 14:54:57.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:56.990235 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:54:57.016370 kernel: audit: type=1130 audit(1734101697.011:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:56.990271 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:54:57.022387 kernel: audit: type=1130 audit(1734101697.016:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:56.992929 systemd-resolved[188]: Defaulting to hostname 'linux'. Dec 13 14:54:57.009612 systemd-modules-load[187]: Inserted module 'br_netfilter' Dec 13 14:54:57.012143 systemd[1]: Started systemd-resolved.service. Dec 13 14:54:57.017003 systemd[1]: Reached target nss-lookup.target. Dec 13 14:54:57.023519 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:54:57.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.034554 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:54:57.039897 kernel: audit: type=1130 audit(1734101697.034:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.039920 kernel: SCSI subsystem initialized Dec 13 14:54:57.038925 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:54:57.045592 kernel: audit: type=1130 audit(1734101697.040:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.045380 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:54:57.056490 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:54:57.056527 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:54:57.058704 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:54:57.063530 systemd-modules-load[187]: Inserted module 'dm_multipath' Dec 13 14:54:57.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.064396 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:54:57.070002 kernel: audit: type=1130 audit(1734101697.064:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.065648 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:54:57.071910 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:54:57.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.076989 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:54:57.081974 kernel: audit: type=1130 audit(1734101697.072:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.081018 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:54:57.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.086756 kernel: audit: type=1130 audit(1734101697.080:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.090898 dracut-cmdline[208]: dracut-dracut-053 Dec 13 14:54:57.092933 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:54:57.161706 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:54:57.181711 kernel: iscsi: registered transport (tcp) Dec 13 14:54:57.208789 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:54:57.208842 kernel: QLogic iSCSI HBA Driver Dec 13 14:54:57.261532 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:54:57.262986 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:54:57.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.268739 kernel: audit: type=1130 audit(1734101697.261:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.346803 kernel: raid6: sse2x4 gen() 9218 MB/s Dec 13 14:54:57.363772 kernel: raid6: sse2x4 xor() 4955 MB/s Dec 13 14:54:57.380771 kernel: raid6: sse2x2 gen() 13977 MB/s Dec 13 14:54:57.397771 kernel: raid6: sse2x2 xor() 8742 MB/s Dec 13 14:54:57.414756 kernel: raid6: sse2x1 gen() 11027 MB/s Dec 13 14:54:57.432463 kernel: raid6: sse2x1 xor() 6944 MB/s Dec 13 14:54:57.432524 kernel: raid6: using algorithm sse2x2 gen() 13977 MB/s Dec 13 14:54:57.432552 kernel: raid6: .... xor() 8742 MB/s, rmw enabled Dec 13 14:54:57.433267 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 14:54:57.448462 kernel: xor: measuring software checksum speed Dec 13 14:54:57.448528 kernel: prefetch64-sse : 18323 MB/sec Dec 13 14:54:57.449393 kernel: generic_sse : 16699 MB/sec Dec 13 14:54:57.449430 kernel: xor: using function: prefetch64-sse (18323 MB/sec) Dec 13 14:54:57.562743 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:54:57.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.579866 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:54:57.581000 audit: BPF prog-id=7 op=LOAD Dec 13 14:54:57.581000 audit: BPF prog-id=8 op=LOAD Dec 13 14:54:57.583650 systemd[1]: Starting systemd-udevd.service... Dec 13 14:54:57.597314 systemd-udevd[385]: Using default interface naming scheme 'v252'. Dec 13 14:54:57.609861 systemd[1]: Started systemd-udevd.service. Dec 13 14:54:57.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.614718 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:54:57.631717 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Dec 13 14:54:57.682005 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:54:57.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.683464 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:54:57.726208 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:54:57.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:57.787709 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 14:54:57.810410 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:54:57.810427 kernel: GPT:17805311 != 41943039 Dec 13 14:54:57.810438 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:54:57.810449 kernel: GPT:17805311 != 41943039 Dec 13 14:54:57.810459 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:54:57.810469 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:54:57.836710 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (438) Dec 13 14:54:57.847725 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:54:57.897599 kernel: libata version 3.00 loaded. Dec 13 14:54:57.897640 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 14:54:57.897916 kernel: scsi host0: ata_piix Dec 13 14:54:57.898111 kernel: scsi host1: ata_piix Dec 13 14:54:57.898310 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 14:54:57.898333 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 14:54:57.896369 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:54:57.901988 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:54:57.906597 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:54:57.912061 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:54:57.913549 systemd[1]: Starting disk-uuid.service... Dec 13 14:54:57.927620 disk-uuid[461]: Primary Header is updated. Dec 13 14:54:57.927620 disk-uuid[461]: Secondary Entries is updated. Dec 13 14:54:57.927620 disk-uuid[461]: Secondary Header is updated. Dec 13 14:54:57.936752 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:54:57.943335 kernel: GPT:disk_guids don't match. Dec 13 14:54:57.943364 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:54:57.943378 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:54:59.022759 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:54:59.023515 disk-uuid[462]: The operation has completed successfully. Dec 13 14:54:59.356108 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:54:59.358325 systemd[1]: Finished disk-uuid.service. Dec 13 14:54:59.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.371637 systemd[1]: Starting verity-setup.service... Dec 13 14:54:59.436720 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 14:54:59.541205 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:54:59.544218 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:54:59.547456 systemd[1]: Finished verity-setup.service. Dec 13 14:54:59.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.689709 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:54:59.690542 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:54:59.691609 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:54:59.693188 systemd[1]: Starting ignition-setup.service... Dec 13 14:54:59.694853 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:54:59.722410 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:54:59.722467 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:54:59.722480 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:54:59.756386 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:54:59.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.771743 systemd[1]: Finished ignition-setup.service. Dec 13 14:54:59.775805 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:54:59.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.835609 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:54:59.841000 audit: BPF prog-id=9 op=LOAD Dec 13 14:54:59.844192 systemd[1]: Starting systemd-networkd.service... Dec 13 14:54:59.892463 systemd-networkd[632]: lo: Link UP Dec 13 14:54:59.893355 systemd-networkd[632]: lo: Gained carrier Dec 13 14:54:59.894730 systemd-networkd[632]: Enumeration completed Dec 13 14:54:59.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.895399 systemd[1]: Started systemd-networkd.service. Dec 13 14:54:59.896048 systemd[1]: Reached target network.target. Dec 13 14:54:59.897455 systemd[1]: Starting iscsiuio.service... Dec 13 14:54:59.902524 systemd-networkd[632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:54:59.905892 systemd-networkd[632]: eth0: Link UP Dec 13 14:54:59.905899 systemd-networkd[632]: eth0: Gained carrier Dec 13 14:54:59.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.909967 systemd[1]: Started iscsiuio.service. Dec 13 14:54:59.911398 systemd[1]: Starting iscsid.service... Dec 13 14:54:59.914915 iscsid[641]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:54:59.914915 iscsid[641]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:54:59.914915 iscsid[641]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:54:59.914915 iscsid[641]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:54:59.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.920648 iscsid[641]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:54:59.920648 iscsid[641]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:54:59.918090 systemd[1]: Started iscsid.service. Dec 13 14:54:59.920969 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:54:59.921062 systemd-networkd[632]: eth0: DHCPv4 address 172.24.4.16/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:54:59.936946 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:54:59.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.938273 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:54:59.938896 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:54:59.940327 systemd[1]: Reached target remote-fs.target. Dec 13 14:54:59.943719 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:54:59.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:54:59.954777 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:55:00.057065 ignition[600]: Ignition 2.14.0 Dec 13 14:55:00.057997 ignition[600]: Stage: fetch-offline Dec 13 14:55:00.058228 ignition[600]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:00.058277 ignition[600]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:00.060753 ignition[600]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:00.061046 ignition[600]: parsed url from cmdline: "" Dec 13 14:55:00.061056 ignition[600]: no config URL provided Dec 13 14:55:00.061070 ignition[600]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:55:00.061090 ignition[600]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:55:00.061111 ignition[600]: failed to fetch config: resource requires networking Dec 13 14:55:00.062063 ignition[600]: Ignition finished successfully Dec 13 14:55:00.063954 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:55:00.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.067510 systemd[1]: Starting ignition-fetch.service... Dec 13 14:55:00.084241 ignition[655]: Ignition 2.14.0 Dec 13 14:55:00.084269 ignition[655]: Stage: fetch Dec 13 14:55:00.084513 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:00.084555 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:00.087098 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:00.087340 ignition[655]: parsed url from cmdline: "" Dec 13 14:55:00.087350 ignition[655]: no config URL provided Dec 13 14:55:00.087363 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:55:00.087382 ignition[655]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:55:00.092058 ignition[655]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 14:55:00.092093 ignition[655]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 14:55:00.092257 ignition[655]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 14:55:00.407471 ignition[655]: GET result: OK Dec 13 14:55:00.407673 ignition[655]: parsing config with SHA512: 7a533785e39a4634478abb7df3a9d671ad244d981f0730b963f7e49c6cb3478aa349731daf77eb6fec12599a3c0e38fa48f0e43512275b01c471700f5cb5648b Dec 13 14:55:00.422888 unknown[655]: fetched base config from "system" Dec 13 14:55:00.422916 unknown[655]: fetched base config from "system" Dec 13 14:55:00.423701 ignition[655]: fetch: fetch complete Dec 13 14:55:00.422931 unknown[655]: fetched user config from "openstack" Dec 13 14:55:00.423717 ignition[655]: fetch: fetch passed Dec 13 14:55:00.423799 ignition[655]: Ignition finished successfully Dec 13 14:55:00.429281 systemd[1]: Finished ignition-fetch.service. Dec 13 14:55:00.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.433611 systemd[1]: Starting ignition-kargs.service... Dec 13 14:55:00.461481 ignition[661]: Ignition 2.14.0 Dec 13 14:55:00.461512 ignition[661]: Stage: kargs Dec 13 14:55:00.461828 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:00.461883 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:00.464191 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:00.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.466239 ignition[661]: kargs: kargs passed Dec 13 14:55:00.478492 systemd[1]: Finished ignition-kargs.service. Dec 13 14:55:00.466350 ignition[661]: Ignition finished successfully Dec 13 14:55:00.481882 systemd[1]: Starting ignition-disks.service... Dec 13 14:55:00.499789 ignition[667]: Ignition 2.14.0 Dec 13 14:55:00.499820 ignition[667]: Stage: disks Dec 13 14:55:00.500080 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:00.500133 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:00.502425 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:00.504602 ignition[667]: disks: disks passed Dec 13 14:55:00.504745 ignition[667]: Ignition finished successfully Dec 13 14:55:00.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.507299 systemd[1]: Finished ignition-disks.service. Dec 13 14:55:00.508757 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:55:00.510048 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:55:00.512322 systemd[1]: Reached target local-fs.target. Dec 13 14:55:00.514478 systemd[1]: Reached target sysinit.target. Dec 13 14:55:00.516760 systemd[1]: Reached target basic.target. Dec 13 14:55:00.520941 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:55:00.551802 systemd-fsck[675]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:55:00.564615 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:55:00.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.567824 systemd[1]: Mounting sysroot.mount... Dec 13 14:55:00.586951 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:55:00.588311 systemd[1]: Mounted sysroot.mount. Dec 13 14:55:00.590823 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:55:00.594562 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:55:00.596534 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:55:00.598119 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 14:55:00.603807 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:55:00.603886 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:55:00.613952 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:55:00.622034 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:55:00.623317 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:55:00.629580 initrd-setup-root[687]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:55:00.636298 initrd-setup-root[695]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:55:00.648718 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (682) Dec 13 14:55:00.650465 initrd-setup-root[703]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:55:00.655354 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:55:00.655373 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:55:00.655970 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:55:00.660098 initrd-setup-root[726]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:55:00.675057 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:55:00.736220 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:55:00.737641 systemd[1]: Starting ignition-mount.service... Dec 13 14:55:00.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.738984 systemd[1]: Starting sysroot-boot.service... Dec 13 14:55:00.748243 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:55:00.748372 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:55:00.778419 ignition[750]: INFO : Ignition 2.14.0 Dec 13 14:55:00.778419 ignition[750]: INFO : Stage: mount Dec 13 14:55:00.778419 ignition[750]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:00.778419 ignition[750]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:00.778419 ignition[750]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:00.778419 ignition[750]: INFO : mount: mount passed Dec 13 14:55:00.778419 ignition[750]: INFO : Ignition finished successfully Dec 13 14:55:00.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.783910 systemd[1]: Finished sysroot-boot.service. Dec 13 14:55:00.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.786974 systemd[1]: Finished ignition-mount.service. Dec 13 14:55:00.804766 coreos-metadata[681]: Dec 13 14:55:00.804 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:55:00.819153 coreos-metadata[681]: Dec 13 14:55:00.819 INFO Fetch successful Dec 13 14:55:00.819915 coreos-metadata[681]: Dec 13 14:55:00.819 INFO wrote hostname ci-3510-3-6-1-1fde7ac77d.novalocal to /sysroot/etc/hostname Dec 13 14:55:00.824639 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 14:55:00.824860 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 14:55:00.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:00.827907 systemd[1]: Starting ignition-files.service... Dec 13 14:55:00.838481 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:55:00.849732 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (758) Dec 13 14:55:00.855273 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:55:00.855345 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:55:00.855366 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:55:00.866642 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:55:00.885244 ignition[777]: INFO : Ignition 2.14.0 Dec 13 14:55:00.885244 ignition[777]: INFO : Stage: files Dec 13 14:55:00.887252 ignition[777]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:00.887252 ignition[777]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:00.887252 ignition[777]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:00.893194 ignition[777]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:55:00.895036 ignition[777]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:55:00.895036 ignition[777]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:55:00.901042 ignition[777]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:55:00.902745 ignition[777]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:55:00.904660 unknown[777]: wrote ssh authorized keys file for user: core Dec 13 14:55:00.906052 ignition[777]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:55:00.906052 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:55:00.908945 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:55:01.346187 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 14:55:01.473944 systemd-networkd[632]: eth0: Gained IPv6LL Dec 13 14:55:02.978298 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:55:02.978298 ignition[777]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:55:02.978298 ignition[777]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:55:02.978298 ignition[777]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:55:02.986870 ignition[777]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:55:02.986870 ignition[777]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:55:02.986870 ignition[777]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:55:02.986870 ignition[777]: INFO : files: files passed Dec 13 14:55:02.986870 ignition[777]: INFO : Ignition finished successfully Dec 13 14:55:03.013591 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:55:03.013631 kernel: audit: type=1130 audit(1734101702.989:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:02.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:02.988202 systemd[1]: Finished ignition-files.service. Dec 13 14:55:02.991951 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:55:03.017150 initrd-setup-root-after-ignition[801]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:55:03.012065 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:55:03.014294 systemd[1]: Starting ignition-quench.service... Dec 13 14:55:03.024853 kernel: audit: type=1130 audit(1734101703.019:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.018542 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:55:03.033111 kernel: audit: type=1130 audit(1734101703.024:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.033144 kernel: audit: type=1131 audit(1734101703.024:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.020473 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:55:03.020578 systemd[1]: Finished ignition-quench.service. Dec 13 14:55:03.025599 systemd[1]: Reached target ignition-complete.target. Dec 13 14:55:03.034738 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:55:03.051347 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:55:03.051870 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:55:03.060124 kernel: audit: type=1130 audit(1734101703.051:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.060164 kernel: audit: type=1131 audit(1734101703.051:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.052801 systemd[1]: Reached target initrd-fs.target. Dec 13 14:55:03.060634 systemd[1]: Reached target initrd.target. Dec 13 14:55:03.061797 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:55:03.062969 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:55:03.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.081793 kernel: audit: type=1130 audit(1734101703.075:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.075593 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:55:03.077148 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:55:03.091784 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:55:03.092580 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:55:03.093766 systemd[1]: Stopped target timers.target. Dec 13 14:55:03.094807 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:55:03.100221 kernel: audit: type=1131 audit(1734101703.095:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.095006 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:55:03.096157 systemd[1]: Stopped target initrd.target. Dec 13 14:55:03.100868 systemd[1]: Stopped target basic.target. Dec 13 14:55:03.102000 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:55:03.103128 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:55:03.104200 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:55:03.105308 systemd[1]: Stopped target remote-fs.target. Dec 13 14:55:03.106435 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:55:03.107576 systemd[1]: Stopped target sysinit.target. Dec 13 14:55:03.108591 systemd[1]: Stopped target local-fs.target. Dec 13 14:55:03.109643 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:55:03.110780 systemd[1]: Stopped target swap.target. Dec 13 14:55:03.117015 kernel: audit: type=1131 audit(1734101703.112:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.111761 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:55:03.111962 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:55:03.123025 kernel: audit: type=1131 audit(1734101703.118:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.113062 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:55:03.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.117568 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:55:03.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.117757 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:55:03.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.118861 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:55:03.140312 iscsid[641]: iscsid shutting down. Dec 13 14:55:03.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.119030 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:55:03.123759 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:55:03.123921 systemd[1]: Stopped ignition-files.service. Dec 13 14:55:03.125986 systemd[1]: Stopping ignition-mount.service... Dec 13 14:55:03.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.128506 systemd[1]: Stopping iscsid.service... Dec 13 14:55:03.134934 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:55:03.150916 ignition[815]: INFO : Ignition 2.14.0 Dec 13 14:55:03.150916 ignition[815]: INFO : Stage: umount Dec 13 14:55:03.150916 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:55:03.150916 ignition[815]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:55:03.150916 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:55:03.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.135383 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:55:03.135555 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:55:03.136216 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:55:03.136360 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:55:03.139801 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:55:03.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.162228 ignition[815]: INFO : umount: umount passed Dec 13 14:55:03.162228 ignition[815]: INFO : Ignition finished successfully Dec 13 14:55:03.139897 systemd[1]: Stopped iscsid.service. Dec 13 14:55:03.142215 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:55:03.142740 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:55:03.146523 systemd[1]: Stopping iscsiuio.service... Dec 13 14:55:03.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.149865 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:55:03.149969 systemd[1]: Stopped iscsiuio.service. Dec 13 14:55:03.158341 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:55:03.158420 systemd[1]: Stopped ignition-mount.service. Dec 13 14:55:03.159041 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:55:03.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.159079 systemd[1]: Stopped ignition-disks.service. Dec 13 14:55:03.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.159551 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:55:03.159586 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:55:03.160048 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:55:03.160083 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:55:03.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.160532 systemd[1]: Stopped target network.target. Dec 13 14:55:03.161027 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:55:03.161067 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:55:03.161544 systemd[1]: Stopped target paths.target. Dec 13 14:55:03.161995 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:55:03.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.165771 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:55:03.187000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:55:03.166288 systemd[1]: Stopped target slices.target. Dec 13 14:55:03.166735 systemd[1]: Stopped target sockets.target. Dec 13 14:55:03.167170 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:55:03.167205 systemd[1]: Closed iscsid.socket. Dec 13 14:55:03.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.167620 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:55:03.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.167649 systemd[1]: Closed iscsiuio.socket. Dec 13 14:55:03.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.168075 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:55:03.168112 systemd[1]: Stopped ignition-setup.service. Dec 13 14:55:03.168700 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:55:03.169292 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:55:03.170960 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:55:03.171486 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:55:03.171574 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:55:03.172884 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:55:03.172923 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:55:03.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.175879 systemd-networkd[632]: eth0: DHCPv6 lease lost Dec 13 14:55:03.205000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:55:03.176125 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:55:03.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.176219 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:55:03.178958 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:55:03.179075 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:55:03.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.187766 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:55:03.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.187812 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:55:03.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.189554 systemd[1]: Stopping network-cleanup.service... Dec 13 14:55:03.191767 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:55:03.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.191833 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:55:03.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.192918 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:55:03.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.192963 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:55:03.194161 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:55:03.194204 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:55:03.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.195052 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:55:03.201517 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:55:03.204503 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:55:03.204602 systemd[1]: Stopped network-cleanup.service. Dec 13 14:55:03.206939 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:55:03.207073 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:55:03.207782 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:55:03.207818 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:55:03.209342 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:55:03.209373 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:55:03.210288 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:55:03.210336 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:55:03.211409 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:55:03.211452 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:55:03.212335 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:55:03.212372 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:55:03.214163 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:55:03.215017 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:55:03.215068 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:55:03.217599 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:55:03.217657 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:55:03.221279 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:55:03.221323 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:55:03.223374 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:55:03.223934 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:55:03.224030 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:55:03.225295 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:55:03.227060 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:55:03.248585 systemd[1]: Switching root. Dec 13 14:55:03.269902 systemd-journald[186]: Journal stopped Dec 13 14:55:09.362418 systemd-journald[186]: Received SIGTERM from PID 1 (n/a). Dec 13 14:55:09.362536 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:55:09.362585 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:55:09.362614 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:55:09.362643 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:55:09.362670 kernel: SELinux: policy capability open_perms=1 Dec 13 14:55:09.362740 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:55:09.362770 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:55:09.362797 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:55:09.362831 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:55:09.362858 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:55:09.362891 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:55:09.362920 systemd[1]: Successfully loaded SELinux policy in 90.696ms. Dec 13 14:55:09.362966 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 32.617ms. Dec 13 14:55:09.363004 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:55:09.363035 systemd[1]: Detected virtualization kvm. Dec 13 14:55:09.363064 systemd[1]: Detected architecture x86-64. Dec 13 14:55:09.363092 systemd[1]: Detected first boot. Dec 13 14:55:09.363128 systemd[1]: Hostname set to . Dec 13 14:55:09.363160 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:55:09.363188 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:55:09.363221 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:55:09.363252 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:55:09.363282 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:55:09.363314 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:55:09.363348 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 14:55:09.363375 kernel: audit: type=1334 audit(1734101708.908:90): prog-id=12 op=LOAD Dec 13 14:55:09.363403 kernel: audit: type=1334 audit(1734101708.908:91): prog-id=3 op=UNLOAD Dec 13 14:55:09.363434 kernel: audit: type=1334 audit(1734101708.911:92): prog-id=13 op=LOAD Dec 13 14:55:09.363460 kernel: audit: type=1334 audit(1734101708.915:93): prog-id=14 op=LOAD Dec 13 14:55:09.363487 kernel: audit: type=1334 audit(1734101708.915:94): prog-id=4 op=UNLOAD Dec 13 14:55:09.363514 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:55:09.363542 kernel: audit: type=1334 audit(1734101708.915:95): prog-id=5 op=UNLOAD Dec 13 14:55:09.363570 kernel: audit: type=1131 audit(1734101708.916:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.363597 kernel: audit: type=1334 audit(1734101708.946:97): prog-id=12 op=UNLOAD Dec 13 14:55:09.363624 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:55:09.363659 kernel: audit: type=1130 audit(1734101708.952:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.363723 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:55:09.363757 kernel: audit: type=1131 audit(1734101708.952:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.363785 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:55:09.363821 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:55:09.363852 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:55:09.363882 systemd[1]: Created slice system-getty.slice. Dec 13 14:55:09.363912 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:55:09.363941 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:55:09.363971 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:55:09.364007 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:55:09.364042 systemd[1]: Created slice user.slice. Dec 13 14:55:09.364071 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:55:09.364100 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:55:09.364128 systemd[1]: Set up automount boot.automount. Dec 13 14:55:09.364157 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:55:09.364186 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:55:09.364221 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:55:09.364250 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:55:09.364278 systemd[1]: Reached target integritysetup.target. Dec 13 14:55:09.364311 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:55:09.364340 systemd[1]: Reached target remote-fs.target. Dec 13 14:55:09.364369 systemd[1]: Reached target slices.target. Dec 13 14:55:09.364399 systemd[1]: Reached target swap.target. Dec 13 14:55:09.364428 systemd[1]: Reached target torcx.target. Dec 13 14:55:09.364457 systemd[1]: Reached target veritysetup.target. Dec 13 14:55:09.364489 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:55:09.364520 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:55:09.364549 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:55:09.364578 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:55:09.364611 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:55:09.364643 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:55:09.364672 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:55:09.370832 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:55:09.370860 systemd[1]: Mounting media.mount... Dec 13 14:55:09.370886 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:09.370910 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:55:09.370933 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:55:09.370955 systemd[1]: Mounting tmp.mount... Dec 13 14:55:09.373347 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:55:09.373384 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:55:09.373407 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:55:09.373451 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:55:09.373475 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:55:09.373498 systemd[1]: Starting modprobe@drm.service... Dec 13 14:55:09.373520 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:55:09.373543 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:55:09.373565 systemd[1]: Starting modprobe@loop.service... Dec 13 14:55:09.373593 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:55:09.374526 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:55:09.374558 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:55:09.374581 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:55:09.374603 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:55:09.374626 systemd[1]: Stopped systemd-journald.service. Dec 13 14:55:09.374648 systemd[1]: Starting systemd-journald.service... Dec 13 14:55:09.374670 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:55:09.375240 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:55:09.375261 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:55:09.375274 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:55:09.375286 kernel: loop: module loaded Dec 13 14:55:09.375298 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:55:09.375310 systemd[1]: Stopped verity-setup.service. Dec 13 14:55:09.375323 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:09.375335 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:55:09.375347 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:55:09.375360 systemd[1]: Mounted media.mount. Dec 13 14:55:09.375374 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:55:09.375386 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:55:09.375398 systemd[1]: Mounted tmp.mount. Dec 13 14:55:09.375410 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:55:09.375422 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:55:09.375434 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:55:09.375446 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:55:09.375463 systemd-journald[912]: Journal started Dec 13 14:55:09.375523 systemd-journald[912]: Runtime Journal (/run/log/journal/3a57c5c44f484573badf78aa23adf789) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:55:03.530000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:55:03.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:55:03.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:55:03.669000 audit: BPF prog-id=10 op=LOAD Dec 13 14:55:09.377734 systemd[1]: Finished modprobe@drm.service. Dec 13 14:55:03.669000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:55:03.669000 audit: BPF prog-id=11 op=LOAD Dec 13 14:55:03.670000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:55:03.818000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:55:03.818000 audit[847]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:03.818000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:55:03.821000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:55:03.821000 audit[847]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:03.821000 audit: CWD cwd="/" Dec 13 14:55:03.821000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:03.821000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:03.821000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:55:08.908000 audit: BPF prog-id=12 op=LOAD Dec 13 14:55:08.908000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:55:08.911000 audit: BPF prog-id=13 op=LOAD Dec 13 14:55:08.915000 audit: BPF prog-id=14 op=LOAD Dec 13 14:55:08.915000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:55:08.915000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:55:08.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:08.946000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:55:08.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:08.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.381800 systemd[1]: Started systemd-journald.service. Dec 13 14:55:09.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.218000 audit: BPF prog-id=15 op=LOAD Dec 13 14:55:09.218000 audit: BPF prog-id=16 op=LOAD Dec 13 14:55:09.219000 audit: BPF prog-id=17 op=LOAD Dec 13 14:55:09.219000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:55:09.219000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:55:09.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.348000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:55:09.348000 audit[912]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe4ec943a0 a2=4000 a3=7ffe4ec9443c items=0 ppid=1 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:09.348000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:55:09.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.816585 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:55:08.906771 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:55:03.817277 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:55:08.906785 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:55:03.817302 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:55:08.916569 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:55:09.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.817345 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:55:09.383070 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:55:09.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.817359 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:55:09.383202 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:55:03.817396 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:55:09.384879 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:55:03.817413 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:55:09.385028 systemd[1]: Finished modprobe@loop.service. Dec 13 14:55:09.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:03.817708 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:55:09.385891 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:55:03.817756 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:55:09.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.387189 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:55:03.817774 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:55:09.388485 systemd[1]: Reached target network-pre.target. Dec 13 14:55:03.818584 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:55:09.389163 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:55:03.818626 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:55:09.392916 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:55:03.818650 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:55:09.394368 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:55:03.818671 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:55:09.394966 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:55:03.818721 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:55:09.396059 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:55:03.818739 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:55:09.396543 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:55:07.683235 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:07Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:55:09.397072 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:55:07.683503 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:07Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:55:09.399971 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:55:07.683623 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:07Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:55:09.408769 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:55:07.683835 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:07Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:55:09.408910 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:55:07.683895 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:07Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:55:07.683975 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-12-13T14:55:07Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:55:09.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.410940 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:55:09.415027 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:55:09.416917 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:55:09.417461 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:55:09.424927 systemd-journald[912]: Time spent on flushing to /var/log/journal/3a57c5c44f484573badf78aa23adf789 is 51.717ms for 1083 entries. Dec 13 14:55:09.424927 systemd-journald[912]: System Journal (/var/log/journal/3a57c5c44f484573badf78aa23adf789) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:55:09.589967 systemd-journald[912]: Received client request to flush runtime journal. Dec 13 14:55:09.590064 kernel: fuse: init (API version 7.34) Dec 13 14:55:09.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:09.446007 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:55:09.448553 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:55:09.592168 udevadm[954]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:55:09.448979 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:55:09.450963 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:55:09.454580 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:55:09.510800 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:55:09.512688 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:55:09.526168 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:55:09.528238 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:55:09.592008 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:55:09.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.013992 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:55:10.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.017530 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:55:10.087164 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:55:10.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.638496 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:55:10.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.641000 audit: BPF prog-id=18 op=LOAD Dec 13 14:55:10.641000 audit: BPF prog-id=19 op=LOAD Dec 13 14:55:10.641000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:55:10.641000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:55:10.643493 systemd[1]: Starting systemd-udevd.service... Dec 13 14:55:10.688764 systemd-udevd[959]: Using default interface naming scheme 'v252'. Dec 13 14:55:10.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.760000 audit: BPF prog-id=20 op=LOAD Dec 13 14:55:10.756543 systemd[1]: Started systemd-udevd.service. Dec 13 14:55:10.765797 systemd[1]: Starting systemd-networkd.service... Dec 13 14:55:10.797000 audit: BPF prog-id=21 op=LOAD Dec 13 14:55:10.798000 audit: BPF prog-id=22 op=LOAD Dec 13 14:55:10.798000 audit: BPF prog-id=23 op=LOAD Dec 13 14:55:10.802210 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:55:10.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.839502 systemd[1]: Started systemd-userdbd.service. Dec 13 14:55:10.896517 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:55:10.934780 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:55:10.953881 systemd-networkd[969]: lo: Link UP Dec 13 14:55:10.953904 systemd-networkd[969]: lo: Gained carrier Dec 13 14:55:10.954371 systemd-networkd[969]: Enumeration completed Dec 13 14:55:10.954572 systemd[1]: Started systemd-networkd.service. Dec 13 14:55:10.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:10.955327 systemd-networkd[969]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:55:10.957659 systemd-networkd[969]: eth0: Link UP Dec 13 14:55:10.957862 systemd-networkd[969]: eth0: Gained carrier Dec 13 14:55:10.968167 systemd-networkd[969]: eth0: DHCPv4 address 172.24.4.16/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:55:10.973167 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:55:10.975000 audit[964]: AVC avc: denied { confidentiality } for pid=964 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:55:10.975000 audit[964]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bac34536b0 a1=337fc a2=7fd75a4ebbc5 a3=5 items=110 ppid=959 pid=964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:10.975000 audit: CWD cwd="/" Dec 13 14:55:10.975000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=1 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=2 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=3 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=4 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=5 name=(null) inode=14407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=6 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=7 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=8 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=9 name=(null) inode=14409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=10 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=11 name=(null) inode=14410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=12 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=13 name=(null) inode=14411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=14 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=15 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=16 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=17 name=(null) inode=14413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=18 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=19 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=20 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=21 name=(null) inode=14415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=22 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=23 name=(null) inode=14416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=24 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=25 name=(null) inode=14417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=26 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=27 name=(null) inode=14418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=28 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=29 name=(null) inode=14419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=30 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=31 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=32 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=33 name=(null) inode=14421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=34 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=35 name=(null) inode=14422 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=36 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=37 name=(null) inode=14423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=38 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.991691 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 14:55:10.975000 audit: PATH item=39 name=(null) inode=14424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=40 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=41 name=(null) inode=14425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=42 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=43 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=44 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=45 name=(null) inode=14427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=46 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=47 name=(null) inode=14428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=48 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=49 name=(null) inode=14429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=50 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=51 name=(null) inode=14430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=52 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=53 name=(null) inode=14431 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=55 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=56 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=57 name=(null) inode=14433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=58 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=59 name=(null) inode=14434 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=60 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=61 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=62 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=63 name=(null) inode=14436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=64 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=65 name=(null) inode=14437 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=66 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=67 name=(null) inode=14438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=68 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=69 name=(null) inode=14439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=70 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=71 name=(null) inode=14440 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=72 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=73 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=74 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=75 name=(null) inode=14442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=76 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=77 name=(null) inode=14443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=78 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=79 name=(null) inode=14444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=80 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=81 name=(null) inode=14445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=82 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=83 name=(null) inode=14446 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=84 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=85 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=86 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=87 name=(null) inode=14448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=88 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=89 name=(null) inode=14449 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=90 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=91 name=(null) inode=14450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=92 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=93 name=(null) inode=14451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=94 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=95 name=(null) inode=14452 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=96 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=97 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=98 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=99 name=(null) inode=14454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=100 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=101 name=(null) inode=14455 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=102 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=103 name=(null) inode=14456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=104 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=105 name=(null) inode=14457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=106 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=107 name=(null) inode=14458 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PATH item=109 name=(null) inode=14459 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:55:10.975000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:55:11.002257 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:55:11.012704 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:55:11.021721 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:55:11.068161 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:55:11.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:11.069994 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:55:11.110292 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:55:11.148727 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:55:11.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:11.150189 systemd[1]: Reached target cryptsetup.target. Dec 13 14:55:11.153507 systemd[1]: Starting lvm2-activation.service... Dec 13 14:55:11.164222 lvm[989]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:55:11.201922 systemd[1]: Finished lvm2-activation.service. Dec 13 14:55:11.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:11.203267 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:55:11.204415 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:55:11.204482 systemd[1]: Reached target local-fs.target. Dec 13 14:55:11.205569 systemd[1]: Reached target machines.target. Dec 13 14:55:11.209297 systemd[1]: Starting ldconfig.service... Dec 13 14:55:11.212263 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:55:11.212388 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:11.216500 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:55:11.229417 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:55:11.234585 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:55:11.243767 systemd[1]: Starting systemd-sysext.service... Dec 13 14:55:11.258659 systemd[1]: boot.automount: Got automount request for /boot, triggered by 991 (bootctl) Dec 13 14:55:11.261390 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:55:11.321394 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:55:11.327180 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:55:11.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:11.343044 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:55:11.343436 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:55:11.407762 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:55:12.036455 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:55:12.038033 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:55:12.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.085254 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:55:12.134557 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:55:12.162386 systemd-fsck[1001]: fsck.fat 4.2 (2021-01-31) Dec 13 14:55:12.162386 systemd-fsck[1001]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:55:12.167448 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:55:12.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.172094 systemd[1]: Mounting boot.mount... Dec 13 14:55:12.214802 (sd-sysext)[1005]: Using extensions 'kubernetes'. Dec 13 14:55:12.220049 (sd-sysext)[1005]: Merged extensions into '/usr'. Dec 13 14:55:12.249148 systemd[1]: Mounted boot.mount. Dec 13 14:55:12.273910 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.275886 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:55:12.279945 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.282549 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:55:12.284478 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:55:12.286181 systemd[1]: Starting modprobe@loop.service... Dec 13 14:55:12.287277 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.287425 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:12.287567 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.289655 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:55:12.290355 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:55:12.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.293149 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:55:12.295787 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:55:12.296807 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:55:12.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.297775 systemd[1]: Finished systemd-sysext.service. Dec 13 14:55:12.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.298444 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:55:12.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.298569 systemd[1]: Finished modprobe@loop.service. Dec 13 14:55:12.301578 systemd[1]: Starting ensure-sysext.service... Dec 13 14:55:12.302101 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:55:12.302167 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.305288 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:55:12.312346 systemd[1]: Reloading. Dec 13 14:55:12.333010 systemd-tmpfiles[1013]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:55:12.335159 systemd-tmpfiles[1013]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:55:12.341967 systemd-tmpfiles[1013]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:55:12.406157 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:55:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:55:12.406195 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:55:12Z" level=info msg="torcx already run" Dec 13 14:55:12.481998 systemd-networkd[969]: eth0: Gained IPv6LL Dec 13 14:55:12.543868 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:55:12.543891 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:55:12.574638 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:55:12.639000 audit: BPF prog-id=24 op=LOAD Dec 13 14:55:12.639000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:55:12.639000 audit: BPF prog-id=25 op=LOAD Dec 13 14:55:12.639000 audit: BPF prog-id=26 op=LOAD Dec 13 14:55:12.639000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:55:12.639000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:55:12.642000 audit: BPF prog-id=27 op=LOAD Dec 13 14:55:12.642000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:55:12.643000 audit: BPF prog-id=28 op=LOAD Dec 13 14:55:12.643000 audit: BPF prog-id=29 op=LOAD Dec 13 14:55:12.643000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:55:12.643000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:55:12.643000 audit: BPF prog-id=30 op=LOAD Dec 13 14:55:12.643000 audit: BPF prog-id=31 op=LOAD Dec 13 14:55:12.643000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:55:12.644000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:55:12.644000 audit: BPF prog-id=32 op=LOAD Dec 13 14:55:12.644000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:55:12.654096 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:55:12.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.656191 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:55:12.660507 systemd[1]: Starting audit-rules.service... Dec 13 14:55:12.662372 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:55:12.664426 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:55:12.669000 audit: BPF prog-id=33 op=LOAD Dec 13 14:55:12.672000 audit: BPF prog-id=34 op=LOAD Dec 13 14:55:12.671516 systemd[1]: Starting systemd-resolved.service... Dec 13 14:55:12.676418 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:55:12.680571 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:55:12.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.696299 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:55:12.696937 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:55:12.702000 audit[1085]: SYSTEM_BOOT pid=1085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.706814 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.707047 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.708459 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:55:12.710154 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:55:12.713012 systemd[1]: Starting modprobe@loop.service... Dec 13 14:55:12.713514 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.713638 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:12.713815 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:55:12.713914 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.717173 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:55:12.717472 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:55:12.718516 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:55:12.719354 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:55:12.719466 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:55:12.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.720876 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:55:12.720985 systemd[1]: Finished modprobe@loop.service. Dec 13 14:55:12.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.724737 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.724979 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.727465 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:55:12.731113 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:55:12.734039 systemd[1]: Starting modprobe@loop.service... Dec 13 14:55:12.734576 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.734770 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:12.734915 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:55:12.735031 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.736149 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:55:12.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.737219 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:55:12.738538 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:55:12.738651 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:55:12.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.740239 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:55:12.743098 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.743359 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.747126 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:55:12.749979 systemd[1]: Starting modprobe@drm.service... Dec 13 14:55:12.753236 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:55:12.753903 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.754053 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:12.756863 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:55:12.757589 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:55:12.758133 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:55:12.760444 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:55:12.760594 systemd[1]: Finished modprobe@drm.service. Dec 13 14:55:12.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.764946 systemd[1]: Finished ensure-sysext.service. Dec 13 14:55:12.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.766611 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:55:12.766750 systemd[1]: Finished modprobe@loop.service. Dec 13 14:55:12.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.769501 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:55:12.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.781193 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:55:12.781319 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:55:12.781927 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:55:12.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:12.783219 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:55:12.783340 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:55:12.783887 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:55:12.788478 ldconfig[990]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:55:12.789000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:55:12.789000 audit[1110]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4f5d5930 a2=420 a3=0 items=0 ppid=1080 pid=1110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:12.789000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:55:12.791714 augenrules[1110]: No rules Dec 13 14:55:12.792284 systemd[1]: Finished audit-rules.service. Dec 13 14:55:12.799269 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:55:12.810436 systemd[1]: Finished ldconfig.service. Dec 13 14:55:12.812611 systemd[1]: Starting systemd-update-done.service... Dec 13 14:55:12.820551 systemd[1]: Finished systemd-update-done.service. Dec 13 14:55:12.833977 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:55:12.834527 systemd[1]: Reached target time-set.target. Dec 13 14:55:12.837237 systemd-resolved[1083]: Positive Trust Anchors: Dec 13 14:55:12.837277 systemd-resolved[1083]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:55:12.837317 systemd-resolved[1083]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:55:12.845033 systemd-resolved[1083]: Using system hostname 'ci-3510-3-6-1-1fde7ac77d.novalocal'. Dec 13 14:55:12.846689 systemd[1]: Started systemd-resolved.service. Dec 13 14:55:12.847178 systemd[1]: Reached target network.target. Dec 13 14:55:12.847578 systemd[1]: Reached target network-online.target. Dec 13 14:55:12.848007 systemd[1]: Reached target nss-lookup.target. Dec 13 14:55:12.848419 systemd[1]: Reached target sysinit.target. Dec 13 14:55:12.848916 systemd[1]: Started motdgen.path. Dec 13 14:55:12.849339 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:55:12.850032 systemd[1]: Started logrotate.timer. Dec 13 14:55:12.850494 systemd[1]: Started mdadm.timer. Dec 13 14:55:12.850899 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:55:12.851325 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:55:12.851357 systemd[1]: Reached target paths.target. Dec 13 14:55:12.851766 systemd[1]: Reached target timers.target. Dec 13 14:55:12.852492 systemd[1]: Listening on dbus.socket. Dec 13 14:55:12.854453 systemd[1]: Starting docker.socket... Dec 13 14:55:13.321010 systemd-timesyncd[1084]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Dec 13 14:55:13.321338 systemd-timesyncd[1084]: Initial clock synchronization to Fri 2024-12-13 14:55:13.320913 UTC. Dec 13 14:55:13.321616 systemd-resolved[1083]: Clock change detected. Flushing caches. Dec 13 14:55:13.321663 systemd[1]: Listening on sshd.socket. Dec 13 14:55:13.322348 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:13.322851 systemd[1]: Listening on docker.socket. Dec 13 14:55:13.323551 systemd[1]: Reached target sockets.target. Dec 13 14:55:13.323984 systemd[1]: Reached target basic.target. Dec 13 14:55:13.324461 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:55:13.324494 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:55:13.325840 systemd[1]: Starting containerd.service... Dec 13 14:55:13.327636 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:55:13.329454 systemd[1]: Starting dbus.service... Dec 13 14:55:13.332169 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:55:13.334702 systemd[1]: Starting extend-filesystems.service... Dec 13 14:55:13.339013 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:55:13.342380 systemd[1]: Starting kubelet.service... Dec 13 14:55:13.347948 jq[1124]: false Dec 13 14:55:13.348714 systemd[1]: Starting motdgen.service... Dec 13 14:55:13.350667 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:55:13.355773 systemd[1]: Starting sshd-keygen.service... Dec 13 14:55:13.362479 systemd[1]: Starting systemd-logind.service... Dec 13 14:55:13.363214 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:55:13.363280 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:55:13.363889 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:55:13.364721 systemd[1]: Starting update-engine.service... Dec 13 14:55:13.368672 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:55:13.382679 jq[1137]: true Dec 13 14:55:13.390540 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:55:13.390762 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:55:13.398600 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:55:13.398785 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:55:13.401149 dbus-daemon[1121]: [system] SELinux support is enabled Dec 13 14:55:13.401330 systemd[1]: Started dbus.service. Dec 13 14:55:13.403992 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:55:13.404021 systemd[1]: Reached target system-config.target. Dec 13 14:55:13.404489 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:55:13.404503 systemd[1]: Reached target user-config.target. Dec 13 14:55:13.405529 jq[1141]: true Dec 13 14:55:13.414973 extend-filesystems[1125]: Found loop1 Dec 13 14:55:13.414973 extend-filesystems[1125]: Found vda Dec 13 14:55:13.414973 extend-filesystems[1125]: Found vda1 Dec 13 14:55:13.414973 extend-filesystems[1125]: Found vda2 Dec 13 14:55:13.414973 extend-filesystems[1125]: Found vda3 Dec 13 14:55:13.414973 extend-filesystems[1125]: Found usr Dec 13 14:55:13.414973 extend-filesystems[1125]: Found vda4 Dec 13 14:55:13.441056 extend-filesystems[1125]: Found vda6 Dec 13 14:55:13.441056 extend-filesystems[1125]: Found vda7 Dec 13 14:55:13.441056 extend-filesystems[1125]: Found vda9 Dec 13 14:55:13.441056 extend-filesystems[1125]: Checking size of /dev/vda9 Dec 13 14:55:13.427172 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:55:13.465656 extend-filesystems[1125]: Resized partition /dev/vda9 Dec 13 14:55:13.427357 systemd[1]: Finished motdgen.service. Dec 13 14:55:13.466556 extend-filesystems[1163]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:55:13.502479 env[1140]: time="2024-12-13T14:55:13.502022393Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:55:13.512619 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 14:55:13.553256 systemd[1]: Created slice system-sshd.slice. Dec 13 14:55:13.598149 update_engine[1135]: I1213 14:55:13.568594 1135 main.cc:92] Flatcar Update Engine starting Dec 13 14:55:13.598149 update_engine[1135]: I1213 14:55:13.577328 1135 update_check_scheduler.cc:74] Next update check in 5m34s Dec 13 14:55:13.598418 env[1140]: time="2024-12-13T14:55:13.569469820Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:55:13.574076 systemd[1]: Started update-engine.service. Dec 13 14:55:13.576559 systemd[1]: Started locksmithd.service. Dec 13 14:55:13.611024 env[1140]: time="2024-12-13T14:55:13.598934391Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:55:13.611024 env[1140]: time="2024-12-13T14:55:13.601149245Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:55:13.611024 env[1140]: time="2024-12-13T14:55:13.601187717Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:55:13.600260 systemd-logind[1133]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:55:13.600286 systemd-logind[1133]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:55:13.600921 systemd-logind[1133]: New seat seat0. Dec 13 14:55:13.606974 systemd[1]: Started systemd-logind.service. Dec 13 14:55:13.611977 env[1140]: time="2024-12-13T14:55:13.611863269Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:55:13.611977 env[1140]: time="2024-12-13T14:55:13.611904827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.611933501Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612083412Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612183470Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612494673Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612654703Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612676224Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612748169Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:55:13.614643 env[1140]: time="2024-12-13T14:55:13.612763588Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:55:13.633596 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 14:55:13.718675 extend-filesystems[1163]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:55:13.718675 extend-filesystems[1163]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 14:55:13.718675 extend-filesystems[1163]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 14:55:13.732454 extend-filesystems[1125]: Resized filesystem in /dev/vda9 Dec 13 14:55:13.720698 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:55:13.749452 bash[1174]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.736897060Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737033315Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737072529Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737197844Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737349919Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737397679Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737432514Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737470355Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737505601Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737540757Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737621088Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737666323Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.737941258Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:55:13.753224 env[1140]: time="2024-12-13T14:55:13.738142977Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:55:13.721075 systemd[1]: Finished extend-filesystems.service. Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.740985658Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741057443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741095524Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741239123Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741391109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741433097Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741463995Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741495234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741525951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741555316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741679519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.741719865Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.742037661Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.742082195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.756665 env[1140]: time="2024-12-13T14:55:13.742115026Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.740192 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:55:13.760734 env[1140]: time="2024-12-13T14:55:13.742147267Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:55:13.760734 env[1140]: time="2024-12-13T14:55:13.742188163Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:55:13.760734 env[1140]: time="2024-12-13T14:55:13.742218671Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:55:13.760734 env[1140]: time="2024-12-13T14:55:13.742262332Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:55:13.760734 env[1140]: time="2024-12-13T14:55:13.742346871Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:55:13.750755 systemd[1]: Started containerd.service. Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.743857043Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.744033384Z" level=info msg="Connect containerd service" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.744111951Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.745789778Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.750393593Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.750494943Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.754352327Z" level=info msg="containerd successfully booted in 0.255044s" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.759293655Z" level=info msg="Start subscribing containerd event" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.759419881Z" level=info msg="Start recovering state" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.759517475Z" level=info msg="Start event monitor" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.759536630Z" level=info msg="Start snapshots syncer" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.759548312Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:55:13.761148 env[1140]: time="2024-12-13T14:55:13.759557540Z" level=info msg="Start streaming server" Dec 13 14:55:13.915302 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:55:14.127811 sshd_keygen[1155]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:55:14.154262 systemd[1]: Finished sshd-keygen.service. Dec 13 14:55:14.156531 systemd[1]: Starting issuegen.service... Dec 13 14:55:14.158089 systemd[1]: Started sshd@0-172.24.4.16:22-172.24.4.1:42724.service. Dec 13 14:55:14.169850 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:55:14.170026 systemd[1]: Finished issuegen.service. Dec 13 14:55:14.172234 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:55:14.182975 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:55:14.185219 systemd[1]: Started getty@tty1.service. Dec 13 14:55:14.186980 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:55:14.187720 systemd[1]: Reached target getty.target. Dec 13 14:55:15.108167 sshd[1194]: Accepted publickey for core from 172.24.4.1 port 42724 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:15.181138 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:15.280851 systemd-logind[1133]: New session 1 of user core. Dec 13 14:55:15.284950 systemd[1]: Created slice user-500.slice. Dec 13 14:55:15.288844 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:55:15.327956 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:55:15.333605 systemd[1]: Starting user@500.service... Dec 13 14:55:15.350945 (systemd)[1203]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:15.491345 systemd[1203]: Queued start job for default target default.target. Dec 13 14:55:15.492732 systemd[1203]: Reached target paths.target. Dec 13 14:55:15.492844 systemd[1203]: Reached target sockets.target. Dec 13 14:55:15.492924 systemd[1203]: Reached target timers.target. Dec 13 14:55:15.493003 systemd[1203]: Reached target basic.target. Dec 13 14:55:15.493184 systemd[1]: Started user@500.service. Dec 13 14:55:15.495107 systemd[1]: Started session-1.scope. Dec 13 14:55:15.496782 systemd[1203]: Reached target default.target. Dec 13 14:55:15.497212 systemd[1203]: Startup finished in 131ms. Dec 13 14:55:15.768440 systemd[1]: Started kubelet.service. Dec 13 14:55:15.897196 systemd[1]: Started sshd@1-172.24.4.16:22-172.24.4.1:37652.service. Dec 13 14:55:17.338770 sshd[1215]: Accepted publickey for core from 172.24.4.1 port 37652 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:17.341833 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:17.355030 systemd[1]: Started session-2.scope. Dec 13 14:55:17.356546 systemd-logind[1133]: New session 2 of user core. Dec 13 14:55:17.696949 kubelet[1213]: E1213 14:55:17.696023 1213 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:55:17.700783 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:55:17.701068 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:55:17.701561 systemd[1]: kubelet.service: Consumed 1.992s CPU time. Dec 13 14:55:18.127134 sshd[1215]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:18.137965 systemd[1]: Started sshd@2-172.24.4.16:22-172.24.4.1:37668.service. Dec 13 14:55:18.141132 systemd[1]: sshd@1-172.24.4.16:22-172.24.4.1:37652.service: Deactivated successfully. Dec 13 14:55:18.142964 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:55:18.145911 systemd-logind[1133]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:55:18.149065 systemd-logind[1133]: Removed session 2. Dec 13 14:55:19.281463 sshd[1226]: Accepted publickey for core from 172.24.4.1 port 37668 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:19.284350 sshd[1226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:19.295433 systemd[1]: Started session-3.scope. Dec 13 14:55:19.296651 systemd-logind[1133]: New session 3 of user core. Dec 13 14:55:19.923227 sshd[1226]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:19.929455 systemd[1]: sshd@2-172.24.4.16:22-172.24.4.1:37668.service: Deactivated successfully. Dec 13 14:55:19.931068 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:55:19.932521 systemd-logind[1133]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:55:19.934680 systemd-logind[1133]: Removed session 3. Dec 13 14:55:20.614148 coreos-metadata[1120]: Dec 13 14:55:20.614 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:55:20.709634 coreos-metadata[1120]: Dec 13 14:55:20.709 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 14:55:21.050386 coreos-metadata[1120]: Dec 13 14:55:21.050 INFO Fetch successful Dec 13 14:55:21.050386 coreos-metadata[1120]: Dec 13 14:55:21.050 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:55:21.066645 coreos-metadata[1120]: Dec 13 14:55:21.066 INFO Fetch successful Dec 13 14:55:21.072668 unknown[1120]: wrote ssh authorized keys file for user: core Dec 13 14:55:21.100679 update-ssh-keys[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:55:21.102353 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:55:21.103316 systemd[1]: Reached target multi-user.target. Dec 13 14:55:21.107153 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:55:21.125885 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:55:21.126230 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:55:21.127362 systemd[1]: Startup finished in 925ms (kernel) + 6.720s (initrd) + 17.249s (userspace) = 24.894s. Dec 13 14:55:27.952892 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:55:27.953322 systemd[1]: Stopped kubelet.service. Dec 13 14:55:27.953403 systemd[1]: kubelet.service: Consumed 1.992s CPU time. Dec 13 14:55:27.956755 systemd[1]: Starting kubelet.service... Dec 13 14:55:28.100099 systemd[1]: Started kubelet.service. Dec 13 14:55:28.607491 kubelet[1240]: E1213 14:55:28.606814 1240 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:55:28.614330 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:55:28.614454 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:55:29.933534 systemd[1]: Started sshd@3-172.24.4.16:22-172.24.4.1:46424.service. Dec 13 14:55:31.466286 sshd[1247]: Accepted publickey for core from 172.24.4.1 port 46424 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:31.469906 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:31.480914 systemd-logind[1133]: New session 4 of user core. Dec 13 14:55:31.482013 systemd[1]: Started session-4.scope. Dec 13 14:55:32.112447 sshd[1247]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:32.119152 systemd[1]: Started sshd@4-172.24.4.16:22-172.24.4.1:46438.service. Dec 13 14:55:32.121833 systemd[1]: sshd@3-172.24.4.16:22-172.24.4.1:46424.service: Deactivated successfully. Dec 13 14:55:32.123479 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:55:32.126739 systemd-logind[1133]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:55:32.129456 systemd-logind[1133]: Removed session 4. Dec 13 14:55:33.269227 sshd[1252]: Accepted publickey for core from 172.24.4.1 port 46438 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:33.271759 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:33.281520 systemd-logind[1133]: New session 5 of user core. Dec 13 14:55:33.282095 systemd[1]: Started session-5.scope. Dec 13 14:55:33.912449 sshd[1252]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:33.920734 systemd[1]: Started sshd@5-172.24.4.16:22-172.24.4.1:46452.service. Dec 13 14:55:33.921943 systemd[1]: sshd@4-172.24.4.16:22-172.24.4.1:46438.service: Deactivated successfully. Dec 13 14:55:33.924382 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:55:33.927023 systemd-logind[1133]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:55:33.929921 systemd-logind[1133]: Removed session 5. Dec 13 14:55:35.241424 sshd[1258]: Accepted publickey for core from 172.24.4.1 port 46452 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:35.244132 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:35.254833 systemd-logind[1133]: New session 6 of user core. Dec 13 14:55:35.255479 systemd[1]: Started session-6.scope. Dec 13 14:55:35.883129 sshd[1258]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:35.892526 systemd[1]: Started sshd@6-172.24.4.16:22-172.24.4.1:45296.service. Dec 13 14:55:35.893817 systemd[1]: sshd@5-172.24.4.16:22-172.24.4.1:46452.service: Deactivated successfully. Dec 13 14:55:35.895353 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:55:35.899017 systemd-logind[1133]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:55:35.901711 systemd-logind[1133]: Removed session 6. Dec 13 14:55:37.150171 sshd[1265]: Accepted publickey for core from 172.24.4.1 port 45296 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:37.154245 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:37.166253 systemd-logind[1133]: New session 7 of user core. Dec 13 14:55:37.168643 systemd[1]: Started session-7.scope. Dec 13 14:55:37.616887 sudo[1269]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:55:37.618360 sudo[1269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:55:37.629952 dbus-daemon[1121]: \xd0\u001d\xdb4\xd1U: received setenforce notice (enforcing=1818769536) Dec 13 14:55:37.634294 sudo[1269]: pam_unix(sudo:session): session closed for user root Dec 13 14:55:37.886035 sshd[1265]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:37.892503 systemd[1]: Started sshd@7-172.24.4.16:22-172.24.4.1:45308.service. Dec 13 14:55:37.899143 systemd[1]: sshd@6-172.24.4.16:22-172.24.4.1:45296.service: Deactivated successfully. Dec 13 14:55:37.900785 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:55:37.903967 systemd-logind[1133]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:55:37.906490 systemd-logind[1133]: Removed session 7. Dec 13 14:55:38.861858 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:55:38.862454 systemd[1]: Stopped kubelet.service. Dec 13 14:55:38.865481 systemd[1]: Starting kubelet.service... Dec 13 14:55:39.064331 sshd[1272]: Accepted publickey for core from 172.24.4.1 port 45308 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:39.067188 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:39.078713 systemd-logind[1133]: New session 8 of user core. Dec 13 14:55:39.078974 systemd[1]: Started session-8.scope. Dec 13 14:55:39.213998 systemd[1]: Started kubelet.service. Dec 13 14:55:39.498329 sudo[1286]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:55:39.498934 sudo[1286]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:55:39.505999 sudo[1286]: pam_unix(sudo:session): session closed for user root Dec 13 14:55:39.517530 sudo[1285]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:55:39.518107 sudo[1285]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:55:39.541151 systemd[1]: Stopping audit-rules.service... Dec 13 14:55:39.541000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:55:39.545856 kernel: kauditd_printk_skb: 224 callbacks suppressed Dec 13 14:55:39.545968 kernel: audit: type=1305 audit(1734101739.541:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:55:39.551214 auditctl[1289]: No rules Dec 13 14:55:39.541000 audit[1289]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4b40ae40 a2=420 a3=0 items=0 ppid=1 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:39.563423 kernel: audit: type=1300 audit(1734101739.541:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4b40ae40 a2=420 a3=0 items=0 ppid=1 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:39.552654 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:55:39.553017 systemd[1]: Stopped audit-rules.service. Dec 13 14:55:39.564779 systemd[1]: Starting audit-rules.service... Dec 13 14:55:39.541000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:55:39.578377 kernel: audit: type=1327 audit(1734101739.541:207): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:55:39.578493 kernel: audit: type=1131 audit(1734101739.550:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.633480 augenrules[1306]: No rules Dec 13 14:55:39.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.634796 systemd[1]: Finished audit-rules.service. Dec 13 14:55:39.637185 sudo[1285]: pam_unix(sudo:session): session closed for user root Dec 13 14:55:39.635000 audit[1285]: USER_END pid=1285 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.658391 kernel: audit: type=1130 audit(1734101739.633:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.658544 kernel: audit: type=1106 audit(1734101739.635:210): pid=1285 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.658644 kernel: audit: type=1104 audit(1734101739.635:211): pid=1285 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.635000 audit[1285]: CRED_DISP pid=1285 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.697765 kubelet[1280]: E1213 14:55:39.697711 1280 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:55:39.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:55:39.700906 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:55:39.701118 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:55:39.710655 kernel: audit: type=1131 audit(1734101739.699:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:55:39.905377 sshd[1272]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:39.905000 audit[1272]: USER_END pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:39.912991 systemd[1]: sshd@7-172.24.4.16:22-172.24.4.1:45308.service: Deactivated successfully. Dec 13 14:55:39.914944 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:55:39.921617 kernel: audit: type=1106 audit(1734101739.905:213): pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:39.906000 audit[1272]: CRED_DISP pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:39.933035 kernel: audit: type=1104 audit(1734101739.906:214): pid=1272 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:39.931976 systemd-logind[1133]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:55:39.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.16:22-172.24.4.1:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.934684 systemd[1]: Started sshd@8-172.24.4.16:22-172.24.4.1:45310.service. Dec 13 14:55:39.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.16:22-172.24.4.1:45310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:39.938678 systemd-logind[1133]: Removed session 8. Dec 13 14:55:41.306000 audit[1312]: USER_ACCT pid=1312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:41.308511 sshd[1312]: Accepted publickey for core from 172.24.4.1 port 45310 ssh2: RSA SHA256:+09oGiaqJAG/GsKcbZfMfdkIGc2etwcqLTSrJxtgEU0 Dec 13 14:55:41.308000 audit[1312]: CRED_ACQ pid=1312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:41.308000 audit[1312]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdda89710 a2=3 a3=0 items=0 ppid=1 pid=1312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:41.308000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:55:41.311450 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:55:41.322025 systemd-logind[1133]: New session 9 of user core. Dec 13 14:55:41.322908 systemd[1]: Started session-9.scope. Dec 13 14:55:41.333000 audit[1312]: USER_START pid=1312 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:41.336000 audit[1314]: CRED_ACQ pid=1314 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:41.868000 audit[1315]: USER_ACCT pid=1315 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:41.870348 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:55:41.869000 audit[1315]: CRED_REFR pid=1315 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:41.871490 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:55:41.874000 audit[1315]: USER_START pid=1315 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:41.901655 systemd[1]: Starting coreos-metadata.service... Dec 13 14:55:48.976429 coreos-metadata[1319]: Dec 13 14:55:48.976 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:55:49.059549 coreos-metadata[1319]: Dec 13 14:55:49.059 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:55:49.425360 coreos-metadata[1319]: Dec 13 14:55:49.425 INFO Fetch successful Dec 13 14:55:49.425360 coreos-metadata[1319]: Dec 13 14:55:49.425 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Dec 13 14:55:49.440317 coreos-metadata[1319]: Dec 13 14:55:49.440 INFO Fetch successful Dec 13 14:55:49.440630 coreos-metadata[1319]: Dec 13 14:55:49.440 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Dec 13 14:55:49.455331 coreos-metadata[1319]: Dec 13 14:55:49.455 INFO Fetch successful Dec 13 14:55:49.455331 coreos-metadata[1319]: Dec 13 14:55:49.455 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Dec 13 14:55:49.469434 coreos-metadata[1319]: Dec 13 14:55:49.469 INFO Fetch successful Dec 13 14:55:49.469434 coreos-metadata[1319]: Dec 13 14:55:49.469 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Dec 13 14:55:49.484335 coreos-metadata[1319]: Dec 13 14:55:49.484 INFO Fetch successful Dec 13 14:55:49.504326 systemd[1]: Finished coreos-metadata.service. Dec 13 14:55:49.511629 kernel: kauditd_printk_skb: 12 callbacks suppressed Dec 13 14:55:49.511785 kernel: audit: type=1130 audit(1734101749.504:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:49.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:49.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:49.719063 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:55:49.719435 systemd[1]: Stopped kubelet.service. Dec 13 14:55:49.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:49.732862 kernel: audit: type=1130 audit(1734101749.717:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:49.733006 kernel: audit: type=1131 audit(1734101749.722:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:49.737049 systemd[1]: Starting kubelet.service... Dec 13 14:55:50.167532 systemd[1]: Started kubelet.service. Dec 13 14:55:50.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:50.176697 kernel: audit: type=1130 audit(1734101750.167:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:50.269794 kubelet[1343]: E1213 14:55:50.269729 1343 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:55:50.272916 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:55:50.273244 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:55:50.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:55:50.281639 kernel: audit: type=1131 audit(1734101750.272:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:55:51.479671 systemd[1]: Stopped kubelet.service. Dec 13 14:55:51.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:51.490424 systemd[1]: Starting kubelet.service... Dec 13 14:55:51.491889 kernel: audit: type=1130 audit(1734101751.480:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:51.492023 kernel: audit: type=1131 audit(1734101751.480:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:51.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:51.543124 systemd[1]: Reloading. Dec 13 14:55:51.669881 /usr/lib/systemd/system-generators/torcx-generator[1385]: time="2024-12-13T14:55:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:55:51.670494 /usr/lib/systemd/system-generators/torcx-generator[1385]: time="2024-12-13T14:55:51Z" level=info msg="torcx already run" Dec 13 14:55:51.852125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:55:51.852145 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:55:51.876261 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:55:51.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960481 kernel: audit: type=1400 audit(1734101751.952:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.961085 kernel: audit: type=1400 audit(1734101751.952:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.966652 kernel: audit: type=1400 audit(1734101751.960:234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit: BPF prog-id=40 op=LOAD Dec 13 14:55:51.960000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit: BPF prog-id=41 op=LOAD Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.961000 audit: BPF prog-id=42 op=LOAD Dec 13 14:55:51.961000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:55:51.961000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit: BPF prog-id=43 op=LOAD Dec 13 14:55:51.967000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit: BPF prog-id=44 op=LOAD Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.967000 audit: BPF prog-id=45 op=LOAD Dec 13 14:55:51.968000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:55:51.968000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.968000 audit: BPF prog-id=46 op=LOAD Dec 13 14:55:51.968000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.969000 audit: BPF prog-id=47 op=LOAD Dec 13 14:55:51.969000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit: BPF prog-id=48 op=LOAD Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit: BPF prog-id=49 op=LOAD Dec 13 14:55:51.971000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:55:51.971000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.971000 audit: BPF prog-id=50 op=LOAD Dec 13 14:55:51.971000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.972000 audit: BPF prog-id=51 op=LOAD Dec 13 14:55:51.972000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit: BPF prog-id=52 op=LOAD Dec 13 14:55:51.975000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit: BPF prog-id=53 op=LOAD Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:51.975000 audit: BPF prog-id=54 op=LOAD Dec 13 14:55:51.975000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:55:51.975000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:55:51.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:51.986849 systemd[1]: Started kubelet.service. Dec 13 14:55:52.006739 systemd[1]: Stopping kubelet.service... Dec 13 14:55:52.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:52.010726 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:55:52.010900 systemd[1]: Stopped kubelet.service. Dec 13 14:55:52.012718 systemd[1]: Starting kubelet.service... Dec 13 14:55:52.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:52.107406 systemd[1]: Started kubelet.service. Dec 13 14:55:52.767383 kubelet[1445]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:55:52.767383 kubelet[1445]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:55:52.767383 kubelet[1445]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:55:52.858500 kubelet[1445]: I1213 14:55:52.857965 1445 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:55:53.408693 kubelet[1445]: I1213 14:55:53.408560 1445 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:55:53.409031 kubelet[1445]: I1213 14:55:53.409005 1445 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:55:53.409903 kubelet[1445]: I1213 14:55:53.409867 1445 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:55:53.488659 kubelet[1445]: I1213 14:55:53.487990 1445 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:55:53.528528 kubelet[1445]: E1213 14:55:53.528346 1445 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:55:53.528528 kubelet[1445]: I1213 14:55:53.528533 1445 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:55:53.539848 kubelet[1445]: I1213 14:55:53.539807 1445 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:55:53.540254 kubelet[1445]: I1213 14:55:53.540226 1445 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:55:53.540846 kubelet[1445]: I1213 14:55:53.540778 1445 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:55:53.541348 kubelet[1445]: I1213 14:55:53.540990 1445 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.16","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:55:53.541691 kubelet[1445]: I1213 14:55:53.541664 1445 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:55:53.541829 kubelet[1445]: I1213 14:55:53.541811 1445 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:55:53.542152 kubelet[1445]: I1213 14:55:53.542126 1445 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:55:53.552974 kubelet[1445]: I1213 14:55:53.552928 1445 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:55:53.553237 kubelet[1445]: I1213 14:55:53.553211 1445 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:55:53.553451 kubelet[1445]: I1213 14:55:53.553419 1445 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:55:53.553692 kubelet[1445]: E1213 14:55:53.553638 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:53.553692 kubelet[1445]: I1213 14:55:53.553653 1445 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:55:53.553893 kubelet[1445]: E1213 14:55:53.553494 1445 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:53.561537 kubelet[1445]: W1213 14:55:53.561496 1445 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.24.4.16" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:55:53.561825 kubelet[1445]: E1213 14:55:53.561788 1445 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.24.4.16\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:55:53.562310 kubelet[1445]: W1213 14:55:53.562276 1445 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:55:53.562639 kubelet[1445]: E1213 14:55:53.562601 1445 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:55:53.567528 kubelet[1445]: I1213 14:55:53.567467 1445 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:55:53.572059 kubelet[1445]: I1213 14:55:53.572007 1445 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:55:53.572166 kubelet[1445]: W1213 14:55:53.572154 1445 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:55:53.575727 kubelet[1445]: I1213 14:55:53.574968 1445 server.go:1269] "Started kubelet" Dec 13 14:55:53.582000 audit[1445]: AVC avc: denied { mac_admin } for pid=1445 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:53.582000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:55:53.582000 audit[1445]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000734030 a1=c000546780 a2=c000734000 a3=25 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.582000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:55:53.584473 kubelet[1445]: I1213 14:55:53.584388 1445 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:55:53.584000 audit[1445]: AVC avc: denied { mac_admin } for pid=1445 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:53.584000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:55:53.584000 audit[1445]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003ce300 a1=c000546798 a2=c0007340c0 a3=25 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.584000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:55:53.585340 kubelet[1445]: I1213 14:55:53.585302 1445 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:55:53.585655 kubelet[1445]: I1213 14:55:53.585627 1445 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:55:53.591393 kubelet[1445]: I1213 14:55:53.591345 1445 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:55:53.591627 kubelet[1445]: E1213 14:55:53.591546 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:53.592163 kubelet[1445]: I1213 14:55:53.592059 1445 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:55:53.592278 kubelet[1445]: I1213 14:55:53.592177 1445 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:55:53.593557 kubelet[1445]: I1213 14:55:53.593465 1445 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:55:53.598087 kubelet[1445]: I1213 14:55:53.598052 1445 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:55:53.602963 kubelet[1445]: I1213 14:55:53.602876 1445 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:55:53.603510 kubelet[1445]: I1213 14:55:53.603476 1445 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:55:53.608460 kubelet[1445]: I1213 14:55:53.608425 1445 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:55:53.612189 kubelet[1445]: E1213 14:55:53.612144 1445 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.16\" not found" node="172.24.4.16" Dec 13 14:55:53.615158 kubelet[1445]: I1213 14:55:53.615129 1445 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:55:53.615517 kubelet[1445]: I1213 14:55:53.615476 1445 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:55:53.618613 kubelet[1445]: E1213 14:55:53.616194 1445 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:55:53.634535 kubelet[1445]: I1213 14:55:53.634487 1445 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:55:53.650772 kubelet[1445]: I1213 14:55:53.650751 1445 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:55:53.650902 kubelet[1445]: I1213 14:55:53.650892 1445 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:55:53.650980 kubelet[1445]: I1213 14:55:53.650972 1445 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:55:53.655531 kubelet[1445]: I1213 14:55:53.655518 1445 policy_none.go:49] "None policy: Start" Dec 13 14:55:53.659233 kubelet[1445]: I1213 14:55:53.659168 1445 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:55:53.659343 kubelet[1445]: I1213 14:55:53.659334 1445 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:55:53.667000 audit[1458]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.667000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc332dea50 a2=0 a3=7ffc332dea3c items=0 ppid=1445 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:55:53.671314 systemd[1]: Created slice kubepods.slice. Dec 13 14:55:53.672000 audit[1464]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.672000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcfe02fdb0 a2=0 a3=7ffcfe02fd9c items=0 ppid=1445 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:55:53.676670 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:55:53.685027 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:55:53.687427 kubelet[1445]: I1213 14:55:53.687394 1445 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:55:53.686000 audit[1445]: AVC avc: denied { mac_admin } for pid=1445 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:53.686000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:55:53.686000 audit[1445]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e28f00 a1=c000e44c90 a2=c000e28ed0 a3=25 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:55:53.687736 kubelet[1445]: I1213 14:55:53.687473 1445 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:55:53.687736 kubelet[1445]: I1213 14:55:53.687617 1445 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:55:53.687736 kubelet[1445]: I1213 14:55:53.687629 1445 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:55:53.689045 kubelet[1445]: I1213 14:55:53.688334 1445 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:55:53.690090 kubelet[1445]: E1213 14:55:53.690065 1445 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.16\" not found" Dec 13 14:55:53.678000 audit[1466]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.678000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2308f2a0 a2=0 a3=7fff2308f28c items=0 ppid=1445 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:55:53.704000 audit[1471]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.704000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff43b62370 a2=0 a3=7fff43b6235c items=0 ppid=1445 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:55:53.762000 audit[1476]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.762000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe0c500d00 a2=0 a3=7ffe0c500cec items=0 ppid=1445 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:55:53.764153 kubelet[1445]: I1213 14:55:53.764075 1445 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:55:53.764000 audit[1477]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.764000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdaad00490 a2=0 a3=7ffdaad0047c items=0 ppid=1445 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:55:53.765000 audit[1478]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:55:53.765000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3fe75280 a2=0 a3=7fff3fe7526c items=0 ppid=1445 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:55:53.766334 kubelet[1445]: I1213 14:55:53.766311 1445 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:55:53.766427 kubelet[1445]: I1213 14:55:53.766416 1445 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:55:53.766512 kubelet[1445]: I1213 14:55:53.766501 1445 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:55:53.766705 kubelet[1445]: E1213 14:55:53.766688 1445 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:55:53.767000 audit[1479]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.767000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd151a91c0 a2=0 a3=7ffd151a91ac items=0 ppid=1445 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:55:53.767000 audit[1480]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:55:53.767000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffab55c030 a2=0 a3=7fffab55c01c items=0 ppid=1445 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:55:53.769000 audit[1482]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:55:53.769000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcae6c9d90 a2=0 a3=7ffcae6c9d7c items=0 ppid=1445 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:55:53.769000 audit[1481]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:55:53.769000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff70f94e10 a2=0 a3=7fff70f94dfc items=0 ppid=1445 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:55:53.771000 audit[1483]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:55:53.771000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb813e680 a2=0 a3=7ffeb813e66c items=0 ppid=1445 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:53.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:55:53.790514 kubelet[1445]: I1213 14:55:53.790495 1445 kubelet_node_status.go:72] "Attempting to register node" node="172.24.4.16" Dec 13 14:55:53.802944 kubelet[1445]: I1213 14:55:53.802856 1445 kubelet_node_status.go:75] "Successfully registered node" node="172.24.4.16" Dec 13 14:55:53.802944 kubelet[1445]: E1213 14:55:53.802891 1445 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.24.4.16\": node \"172.24.4.16\" not found" Dec 13 14:55:53.825159 kubelet[1445]: E1213 14:55:53.825094 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:53.926132 kubelet[1445]: E1213 14:55:53.925954 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.026928 kubelet[1445]: E1213 14:55:54.026867 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.127539 kubelet[1445]: E1213 14:55:54.127456 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.172856 sudo[1315]: pam_unix(sudo:session): session closed for user root Dec 13 14:55:54.173000 audit[1315]: USER_END pid=1315 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:54.173000 audit[1315]: CRED_DISP pid=1315 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:55:54.228514 kubelet[1445]: E1213 14:55:54.228446 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.329699 kubelet[1445]: E1213 14:55:54.329651 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.347076 sshd[1312]: pam_unix(sshd:session): session closed for user core Dec 13 14:55:54.349000 audit[1312]: USER_END pid=1312 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:54.350000 audit[1312]: CRED_DISP pid=1312 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:55:54.354327 systemd[1]: sshd@8-172.24.4.16:22-172.24.4.1:45310.service: Deactivated successfully. Dec 13 14:55:54.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.16:22-172.24.4.1:45310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:55:54.356245 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:55:54.356669 systemd[1]: session-9.scope: Consumed 1.196s CPU time. Dec 13 14:55:54.358058 systemd-logind[1133]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:55:54.361195 systemd-logind[1133]: Removed session 9. Dec 13 14:55:54.414697 kubelet[1445]: I1213 14:55:54.414622 1445 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:55:54.415154 kubelet[1445]: W1213 14:55:54.414965 1445 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:55:54.415154 kubelet[1445]: W1213 14:55:54.415058 1445 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:55:54.431007 kubelet[1445]: E1213 14:55:54.430961 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.532325 kubelet[1445]: E1213 14:55:54.532137 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.554786 kubelet[1445]: E1213 14:55:54.554729 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:54.633050 kubelet[1445]: E1213 14:55:54.632999 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.733719 kubelet[1445]: E1213 14:55:54.733644 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.834359 kubelet[1445]: E1213 14:55:54.834205 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:54.935953 kubelet[1445]: E1213 14:55:54.935851 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:55.036174 kubelet[1445]: E1213 14:55:55.036068 1445 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.16\" not found" Dec 13 14:55:55.137761 kubelet[1445]: I1213 14:55:55.137543 1445 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:55:55.139319 env[1140]: time="2024-12-13T14:55:55.139082254Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:55:55.140210 kubelet[1445]: I1213 14:55:55.139902 1445 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:55:55.555093 kubelet[1445]: I1213 14:55:55.555010 1445 apiserver.go:52] "Watching apiserver" Dec 13 14:55:55.555618 kubelet[1445]: E1213 14:55:55.555494 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:55.571182 kubelet[1445]: E1213 14:55:55.569939 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:55:55.582792 systemd[1]: Created slice kubepods-besteffort-pod52fb8c46_43e5_4965_9666_95ad3e0fa824.slice. Dec 13 14:55:55.592981 kubelet[1445]: I1213 14:55:55.592920 1445 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:55:55.603881 kubelet[1445]: I1213 14:55:55.603831 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-cni-log-dir\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.604174 kubelet[1445]: I1213 14:55:55.604133 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ae47f13a-3f41-493f-8965-9006bf77c54f-varrun\") pod \"csi-node-driver-v58p7\" (UID: \"ae47f13a-3f41-493f-8965-9006bf77c54f\") " pod="calico-system/csi-node-driver-v58p7" Dec 13 14:55:55.604397 kubelet[1445]: I1213 14:55:55.604353 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/52fb8c46-43e5-4965-9666-95ad3e0fa824-lib-modules\") pod \"kube-proxy-8hf4t\" (UID: \"52fb8c46-43e5-4965-9666-95ad3e0fa824\") " pod="kube-system/kube-proxy-8hf4t" Dec 13 14:55:55.604631 kubelet[1445]: I1213 14:55:55.604558 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/eb4478ea-cf73-462a-9de9-0dee25312614-node-certs\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.604857 kubelet[1445]: I1213 14:55:55.604823 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-cni-net-dir\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.605441 kubelet[1445]: I1213 14:55:55.605048 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-cni-bin-dir\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.606195 kubelet[1445]: I1213 14:55:55.606158 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/52fb8c46-43e5-4965-9666-95ad3e0fa824-kube-proxy\") pod \"kube-proxy-8hf4t\" (UID: \"52fb8c46-43e5-4965-9666-95ad3e0fa824\") " pod="kube-system/kube-proxy-8hf4t" Dec 13 14:55:55.606413 kubelet[1445]: I1213 14:55:55.606379 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-xtables-lock\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.606652 kubelet[1445]: I1213 14:55:55.606616 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-var-lib-calico\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.606864 kubelet[1445]: I1213 14:55:55.606827 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mdhkt\" (UniqueName: \"kubernetes.io/projected/eb4478ea-cf73-462a-9de9-0dee25312614-kube-api-access-mdhkt\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.607062 kubelet[1445]: I1213 14:55:55.607028 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ae47f13a-3f41-493f-8965-9006bf77c54f-kubelet-dir\") pod \"csi-node-driver-v58p7\" (UID: \"ae47f13a-3f41-493f-8965-9006bf77c54f\") " pod="calico-system/csi-node-driver-v58p7" Dec 13 14:55:55.607158 systemd[1]: Created slice kubepods-besteffort-podeb4478ea_cf73_462a_9de9_0dee25312614.slice. Dec 13 14:55:55.608300 kubelet[1445]: I1213 14:55:55.608259 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ae47f13a-3f41-493f-8965-9006bf77c54f-registration-dir\") pod \"csi-node-driver-v58p7\" (UID: \"ae47f13a-3f41-493f-8965-9006bf77c54f\") " pod="calico-system/csi-node-driver-v58p7" Dec 13 14:55:55.608617 kubelet[1445]: I1213 14:55:55.608488 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-md54z\" (UniqueName: \"kubernetes.io/projected/52fb8c46-43e5-4965-9666-95ad3e0fa824-kube-api-access-md54z\") pod \"kube-proxy-8hf4t\" (UID: \"52fb8c46-43e5-4965-9666-95ad3e0fa824\") " pod="kube-system/kube-proxy-8hf4t" Dec 13 14:55:55.608876 kubelet[1445]: I1213 14:55:55.608841 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-var-run-calico\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.609120 kubelet[1445]: I1213 14:55:55.609048 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-flexvol-driver-host\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.609332 kubelet[1445]: I1213 14:55:55.609289 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eb4478ea-cf73-462a-9de9-0dee25312614-tigera-ca-bundle\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.609515 kubelet[1445]: I1213 14:55:55.609484 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ae47f13a-3f41-493f-8965-9006bf77c54f-socket-dir\") pod \"csi-node-driver-v58p7\" (UID: \"ae47f13a-3f41-493f-8965-9006bf77c54f\") " pod="calico-system/csi-node-driver-v58p7" Dec 13 14:55:55.609760 kubelet[1445]: I1213 14:55:55.609725 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qkw2k\" (UniqueName: \"kubernetes.io/projected/ae47f13a-3f41-493f-8965-9006bf77c54f-kube-api-access-qkw2k\") pod \"csi-node-driver-v58p7\" (UID: \"ae47f13a-3f41-493f-8965-9006bf77c54f\") " pod="calico-system/csi-node-driver-v58p7" Dec 13 14:55:55.610017 kubelet[1445]: I1213 14:55:55.609981 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/52fb8c46-43e5-4965-9666-95ad3e0fa824-xtables-lock\") pod \"kube-proxy-8hf4t\" (UID: \"52fb8c46-43e5-4965-9666-95ad3e0fa824\") " pod="kube-system/kube-proxy-8hf4t" Dec 13 14:55:55.610259 kubelet[1445]: I1213 14:55:55.610179 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-lib-modules\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.610554 kubelet[1445]: I1213 14:55:55.610472 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/eb4478ea-cf73-462a-9de9-0dee25312614-policysync\") pod \"calico-node-6m2cd\" (UID: \"eb4478ea-cf73-462a-9de9-0dee25312614\") " pod="calico-system/calico-node-6m2cd" Dec 13 14:55:55.715724 kubelet[1445]: E1213 14:55:55.715635 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.715724 kubelet[1445]: W1213 14:55:55.715689 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.715724 kubelet[1445]: E1213 14:55:55.715746 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.716252 kubelet[1445]: E1213 14:55:55.716208 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.716252 kubelet[1445]: W1213 14:55:55.716244 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.716447 kubelet[1445]: E1213 14:55:55.716270 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.717671 kubelet[1445]: E1213 14:55:55.716640 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.717671 kubelet[1445]: W1213 14:55:55.717185 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.717671 kubelet[1445]: E1213 14:55:55.717372 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.718103 kubelet[1445]: E1213 14:55:55.717851 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.718103 kubelet[1445]: W1213 14:55:55.717874 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.718103 kubelet[1445]: E1213 14:55:55.718021 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.718449 kubelet[1445]: E1213 14:55:55.718281 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.718449 kubelet[1445]: W1213 14:55:55.718301 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.718449 kubelet[1445]: E1213 14:55:55.718440 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.718907 kubelet[1445]: E1213 14:55:55.718691 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.718907 kubelet[1445]: W1213 14:55:55.718710 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.718907 kubelet[1445]: E1213 14:55:55.718848 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.719273 kubelet[1445]: E1213 14:55:55.719036 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.719273 kubelet[1445]: W1213 14:55:55.719055 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.719273 kubelet[1445]: E1213 14:55:55.719190 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.719687 kubelet[1445]: E1213 14:55:55.719393 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.719687 kubelet[1445]: W1213 14:55:55.719412 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.719687 kubelet[1445]: E1213 14:55:55.719545 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.720004 kubelet[1445]: E1213 14:55:55.719817 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.720004 kubelet[1445]: W1213 14:55:55.719836 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.720004 kubelet[1445]: E1213 14:55:55.719971 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.720236 kubelet[1445]: E1213 14:55:55.720165 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.720236 kubelet[1445]: W1213 14:55:55.720184 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.720384 kubelet[1445]: E1213 14:55:55.720342 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.720680 kubelet[1445]: E1213 14:55:55.720631 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.720680 kubelet[1445]: W1213 14:55:55.720661 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.721006 kubelet[1445]: E1213 14:55:55.720826 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.721098 kubelet[1445]: E1213 14:55:55.721062 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.721098 kubelet[1445]: W1213 14:55:55.721084 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.721466 kubelet[1445]: E1213 14:55:55.721389 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.721775 kubelet[1445]: E1213 14:55:55.721723 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.721775 kubelet[1445]: W1213 14:55:55.721765 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.722138 kubelet[1445]: E1213 14:55:55.722067 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.722138 kubelet[1445]: W1213 14:55:55.722101 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.722886 kubelet[1445]: E1213 14:55:55.722081 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.722886 kubelet[1445]: E1213 14:55:55.722390 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.722886 kubelet[1445]: E1213 14:55:55.722375 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.722886 kubelet[1445]: W1213 14:55:55.722483 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.722886 kubelet[1445]: E1213 14:55:55.722643 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.723805 kubelet[1445]: E1213 14:55:55.723762 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.724055 kubelet[1445]: W1213 14:55:55.724018 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.724528 kubelet[1445]: I1213 14:55:55.724468 1445 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:55:55.724803 kubelet[1445]: E1213 14:55:55.724774 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.724967 kubelet[1445]: W1213 14:55:55.724937 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.725453 kubelet[1445]: E1213 14:55:55.725413 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.725758 kubelet[1445]: W1213 14:55:55.725726 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.726203 kubelet[1445]: E1213 14:55:55.726176 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.726358 kubelet[1445]: W1213 14:55:55.726332 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.726849 kubelet[1445]: E1213 14:55:55.726824 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.727198 kubelet[1445]: W1213 14:55:55.727161 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.727904 kubelet[1445]: E1213 14:55:55.727865 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.728186 kubelet[1445]: W1213 14:55:55.728155 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.728917 kubelet[1445]: E1213 14:55:55.728873 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.729236 kubelet[1445]: W1213 14:55:55.729201 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.729868 kubelet[1445]: E1213 14:55:55.729836 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.730134 kubelet[1445]: W1213 14:55:55.730105 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.730685 kubelet[1445]: E1213 14:55:55.730657 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.730982 kubelet[1445]: W1213 14:55:55.730939 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.731871 kubelet[1445]: E1213 14:55:55.731839 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.732164 kubelet[1445]: W1213 14:55:55.732124 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.732439 kubelet[1445]: E1213 14:55:55.732399 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.732996 kubelet[1445]: E1213 14:55:55.732965 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.733198 kubelet[1445]: W1213 14:55:55.733168 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.733672 kubelet[1445]: E1213 14:55:55.733522 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.733959 kubelet[1445]: E1213 14:55:55.727126 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.734309 kubelet[1445]: E1213 14:55:55.727140 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.734640 kubelet[1445]: E1213 14:55:55.729160 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.734804 kubelet[1445]: E1213 14:55:55.732073 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.734974 kubelet[1445]: E1213 14:55:55.727085 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.735120 kubelet[1445]: E1213 14:55:55.728110 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.735269 kubelet[1445]: E1213 14:55:55.727107 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.735447 kubelet[1445]: E1213 14:55:55.730064 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.735690 kubelet[1445]: E1213 14:55:55.730885 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.760384 kubelet[1445]: E1213 14:55:55.760317 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.760384 kubelet[1445]: W1213 14:55:55.760364 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.760798 kubelet[1445]: E1213 14:55:55.760402 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.762980 kubelet[1445]: E1213 14:55:55.762929 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.763113 kubelet[1445]: W1213 14:55:55.763048 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.763113 kubelet[1445]: E1213 14:55:55.763090 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.764148 kubelet[1445]: E1213 14:55:55.764082 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.764148 kubelet[1445]: W1213 14:55:55.764129 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.764375 kubelet[1445]: E1213 14:55:55.764294 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.765882 kubelet[1445]: E1213 14:55:55.765828 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.766163 kubelet[1445]: W1213 14:55:55.766112 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.766467 kubelet[1445]: E1213 14:55:55.766407 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.768862 kubelet[1445]: E1213 14:55:55.768833 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.769058 kubelet[1445]: W1213 14:55:55.769027 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.769528 kubelet[1445]: E1213 14:55:55.769502 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.769819 kubelet[1445]: W1213 14:55:55.769779 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.770325 kubelet[1445]: E1213 14:55:55.770298 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.770497 kubelet[1445]: W1213 14:55:55.770468 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.771010 kubelet[1445]: E1213 14:55:55.770959 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.771248 kubelet[1445]: E1213 14:55:55.771216 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.771413 kubelet[1445]: E1213 14:55:55.771385 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.772004 kubelet[1445]: E1213 14:55:55.771976 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.772202 kubelet[1445]: W1213 14:55:55.772170 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.772428 kubelet[1445]: E1213 14:55:55.772371 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.773068 kubelet[1445]: E1213 14:55:55.773036 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.773240 kubelet[1445]: W1213 14:55:55.773213 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.773504 kubelet[1445]: E1213 14:55:55.773449 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.774257 kubelet[1445]: E1213 14:55:55.774217 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.774441 kubelet[1445]: W1213 14:55:55.774413 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.774768 kubelet[1445]: E1213 14:55:55.774692 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.775378 kubelet[1445]: E1213 14:55:55.775346 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.775643 kubelet[1445]: W1213 14:55:55.775531 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.775909 kubelet[1445]: E1213 14:55:55.775855 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.776540 kubelet[1445]: E1213 14:55:55.776504 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.776873 kubelet[1445]: W1213 14:55:55.776825 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.777175 kubelet[1445]: E1213 14:55:55.777113 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.777857 kubelet[1445]: E1213 14:55:55.777819 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.778051 kubelet[1445]: W1213 14:55:55.778022 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.778288 kubelet[1445]: E1213 14:55:55.778234 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.778919 kubelet[1445]: E1213 14:55:55.778890 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.779088 kubelet[1445]: W1213 14:55:55.779060 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.779333 kubelet[1445]: E1213 14:55:55.779279 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.780101 kubelet[1445]: E1213 14:55:55.780057 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.780350 kubelet[1445]: W1213 14:55:55.780304 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.780761 kubelet[1445]: E1213 14:55:55.780700 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.781430 kubelet[1445]: E1213 14:55:55.781398 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.781695 kubelet[1445]: W1213 14:55:55.781664 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.781950 kubelet[1445]: E1213 14:55:55.781897 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.782450 kubelet[1445]: E1213 14:55:55.782421 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.782768 kubelet[1445]: W1213 14:55:55.782737 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.783038 kubelet[1445]: E1213 14:55:55.782982 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.783742 kubelet[1445]: E1213 14:55:55.783700 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.783991 kubelet[1445]: W1213 14:55:55.783949 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.784359 kubelet[1445]: E1213 14:55:55.784283 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.785126 kubelet[1445]: E1213 14:55:55.785088 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.785386 kubelet[1445]: W1213 14:55:55.785344 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.786042 kubelet[1445]: E1213 14:55:55.785987 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.786423 kubelet[1445]: E1213 14:55:55.786392 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.786712 kubelet[1445]: W1213 14:55:55.786676 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.787019 kubelet[1445]: E1213 14:55:55.786955 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.787527 kubelet[1445]: E1213 14:55:55.787499 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.787811 kubelet[1445]: W1213 14:55:55.787778 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.788083 kubelet[1445]: E1213 14:55:55.788029 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.788633 kubelet[1445]: E1213 14:55:55.788546 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.788870 kubelet[1445]: W1213 14:55:55.788824 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.789216 kubelet[1445]: E1213 14:55:55.789160 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.789801 kubelet[1445]: E1213 14:55:55.789772 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.790001 kubelet[1445]: W1213 14:55:55.789970 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.790198 kubelet[1445]: E1213 14:55:55.790160 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.810620 kubelet[1445]: E1213 14:55:55.805245 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.810620 kubelet[1445]: W1213 14:55:55.805310 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.810620 kubelet[1445]: E1213 14:55:55.805351 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.810620 kubelet[1445]: E1213 14:55:55.809499 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:55:55.810620 kubelet[1445]: W1213 14:55:55.809517 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:55:55.810620 kubelet[1445]: E1213 14:55:55.809540 1445 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:55:55.906073 env[1140]: time="2024-12-13T14:55:55.905342484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8hf4t,Uid:52fb8c46-43e5-4965-9666-95ad3e0fa824,Namespace:kube-system,Attempt:0,}" Dec 13 14:55:55.918036 env[1140]: time="2024-12-13T14:55:55.917460931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6m2cd,Uid:eb4478ea-cf73-462a-9de9-0dee25312614,Namespace:calico-system,Attempt:0,}" Dec 13 14:55:56.556236 kubelet[1445]: E1213 14:55:56.556113 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:56.738597 env[1140]: time="2024-12-13T14:55:56.738448088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.742678 env[1140]: time="2024-12-13T14:55:56.740724735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.744402 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1327366980.mount: Deactivated successfully. Dec 13 14:55:56.749229 env[1140]: time="2024-12-13T14:55:56.749130724Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.756699 env[1140]: time="2024-12-13T14:55:56.754953653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.759207 env[1140]: time="2024-12-13T14:55:56.759156235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.764362 env[1140]: time="2024-12-13T14:55:56.764261320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.766142 env[1140]: time="2024-12-13T14:55:56.766062437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.768493 kubelet[1445]: E1213 14:55:56.767815 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:55:56.778356 env[1140]: time="2024-12-13T14:55:56.778241030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:56.852868 env[1140]: time="2024-12-13T14:55:56.851231412Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:55:56.853173 env[1140]: time="2024-12-13T14:55:56.853111023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:55:56.853506 env[1140]: time="2024-12-13T14:55:56.853413577Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:55:56.854089 env[1140]: time="2024-12-13T14:55:56.854021550Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c pid=1549 runtime=io.containerd.runc.v2 Dec 13 14:55:56.856325 env[1140]: time="2024-12-13T14:55:56.856189949Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:55:56.856500 env[1140]: time="2024-12-13T14:55:56.856288470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:55:56.856500 env[1140]: time="2024-12-13T14:55:56.856316210Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:55:56.856776 env[1140]: time="2024-12-13T14:55:56.856530423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbde8dcd90a7a5dd0cd166ebac2743b660775c5f5d82ca6e994801563d3b5d19 pid=1560 runtime=io.containerd.runc.v2 Dec 13 14:55:56.882704 systemd[1]: Started cri-containerd-79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c.scope. Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.919441 kernel: kauditd_printk_skb: 225 callbacks suppressed Dec 13 14:55:56.919533 kernel: audit: type=1400 audit(1734101756.916:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926225 kernel: audit: type=1400 audit(1734101756.916:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.930103 systemd[1]: Started cri-containerd-bbde8dcd90a7a5dd0cd166ebac2743b660775c5f5d82ca6e994801563d3b5d19.scope. Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.941702 kernel: audit: type=1400 audit(1734101756.916:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.941755 kernel: audit: type=1400 audit(1734101756.916:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.945662 kernel: audit: type=1400 audit(1734101756.916:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.951684 kernel: audit: type=1400 audit(1734101756.916:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.957694 env[1140]: time="2024-12-13T14:55:56.957645878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6m2cd,Uid:eb4478ea-cf73-462a-9de9-0dee25312614,Namespace:calico-system,Attempt:0,} returns sandbox id \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\"" Dec 13 14:55:56.960084 kernel: audit: type=1400 audit(1734101756.916:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.960156 kernel: audit: type=1400 audit(1734101756.916:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.962120 env[1140]: time="2024-12-13T14:55:56.962079504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:55:56.965631 kernel: audit: type=1400 audit(1734101756.916:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.969600 kernel: audit: type=1400 audit(1734101756.917:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.917000 audit: BPF prog-id=55 op=LOAD Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1549 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739666630353633316165646338613963653037373866386264646664 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1549 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739666630353633316165646338613963653037373866386264646664 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.926000 audit: BPF prog-id=56 op=LOAD Dec 13 14:55:56.926000 audit[1575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002bfdb0 items=0 ppid=1549 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739666630353633316165646338613963653037373866386264646664 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit: BPF prog-id=57 op=LOAD Dec 13 14:55:56.927000 audit[1575]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002bfdf8 items=0 ppid=1549 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739666630353633316165646338613963653037373866386264646664 Dec 13 14:55:56.927000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:55:56.927000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { perfmon } for pid=1575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit[1575]: AVC avc: denied { bpf } for pid=1575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.927000 audit: BPF prog-id=58 op=LOAD Dec 13 14:55:56.927000 audit[1575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00038c208 items=0 ppid=1549 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739666630353633316165646338613963653037373866386264646664 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.970000 audit: BPF prog-id=59 op=LOAD Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1560 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538646364393061376135646430636431363665626163323734 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1560 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538646364393061376135646430636431363665626163323734 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit: BPF prog-id=60 op=LOAD Dec 13 14:55:56.971000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000285310 items=0 ppid=1560 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538646364393061376135646430636431363665626163323734 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit: BPF prog-id=61 op=LOAD Dec 13 14:55:56.971000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000285358 items=0 ppid=1560 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538646364393061376135646430636431363665626163323734 Dec 13 14:55:56.971000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:55:56.971000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:56.971000 audit: BPF prog-id=62 op=LOAD Dec 13 14:55:56.971000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000285768 items=0 ppid=1560 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:56.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538646364393061376135646430636431363665626163323734 Dec 13 14:55:56.991809 env[1140]: time="2024-12-13T14:55:56.991756399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8hf4t,Uid:52fb8c46-43e5-4965-9666-95ad3e0fa824,Namespace:kube-system,Attempt:0,} returns sandbox id \"bbde8dcd90a7a5dd0cd166ebac2743b660775c5f5d82ca6e994801563d3b5d19\"" Dec 13 14:55:57.556936 kubelet[1445]: E1213 14:55:57.556867 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:58.558323 kubelet[1445]: E1213 14:55:58.558234 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:55:58.632202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1325939480.mount: Deactivated successfully. Dec 13 14:55:58.767484 kubelet[1445]: E1213 14:55:58.767382 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:55:58.824501 env[1140]: time="2024-12-13T14:55:58.824358793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:58.827069 env[1140]: time="2024-12-13T14:55:58.826967573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:58.829371 env[1140]: time="2024-12-13T14:55:58.829316866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:58.831544 env[1140]: time="2024-12-13T14:55:58.831472114Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:55:58.832202 env[1140]: time="2024-12-13T14:55:58.832159966Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:55:58.837060 env[1140]: time="2024-12-13T14:55:58.836993480Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:55:58.839262 env[1140]: time="2024-12-13T14:55:58.839214839Z" level=info msg="CreateContainer within sandbox \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:55:58.862151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3351818490.mount: Deactivated successfully. Dec 13 14:55:58.868067 env[1140]: time="2024-12-13T14:55:58.868005498Z" level=info msg="CreateContainer within sandbox \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e\"" Dec 13 14:55:58.869363 env[1140]: time="2024-12-13T14:55:58.869306076Z" level=info msg="StartContainer for \"da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e\"" Dec 13 14:55:58.913470 systemd[1]: Started cri-containerd-da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e.scope. Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fedbd3f7238 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:58.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393462623065393264343965626564333836356439636334376136 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.937000 audit: BPF prog-id=63 op=LOAD Dec 13 14:55:58.937000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fbc58 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:58.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393462623065393264343965626564333836356439636334376136 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit: BPF prog-id=64 op=LOAD Dec 13 14:55:58.938000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fbca8 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:58.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393462623065393264343965626564333836356439636334376136 Dec 13 14:55:58.938000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:55:58.938000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:55:58.938000 audit: BPF prog-id=65 op=LOAD Dec 13 14:55:58.938000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fbd38 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:55:58.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393462623065393264343965626564333836356439636334376136 Dec 13 14:55:58.968692 env[1140]: time="2024-12-13T14:55:58.968542102Z" level=info msg="StartContainer for \"da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e\" returns successfully" Dec 13 14:55:58.973661 systemd[1]: cri-containerd-da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e.scope: Deactivated successfully. Dec 13 14:55:58.976000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:55:58.997774 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e-rootfs.mount: Deactivated successfully. Dec 13 14:55:59.190394 env[1140]: time="2024-12-13T14:55:59.185787768Z" level=info msg="shim disconnected" id=da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e Dec 13 14:55:59.190394 env[1140]: time="2024-12-13T14:55:59.185896388Z" level=warning msg="cleaning up after shim disconnected" id=da94bb0e92d49ebed3865d9cc47a6ee240744cc35d836f2772a4e4b473b8620e namespace=k8s.io Dec 13 14:55:59.190394 env[1140]: time="2024-12-13T14:55:59.185924739Z" level=info msg="cleaning up dead shim" Dec 13 14:55:59.209481 env[1140]: time="2024-12-13T14:55:59.209368279Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:55:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1669 runtime=io.containerd.runc.v2\n" Dec 13 14:55:59.233550 update_engine[1135]: I1213 14:55:59.233389 1135 update_attempter.cc:509] Updating boot flags... Dec 13 14:55:59.558841 kubelet[1445]: E1213 14:55:59.558734 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:00.560042 kubelet[1445]: E1213 14:56:00.559964 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:00.685162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3968820511.mount: Deactivated successfully. Dec 13 14:56:00.767149 kubelet[1445]: E1213 14:56:00.767011 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:01.560864 kubelet[1445]: E1213 14:56:01.560753 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:01.694684 env[1140]: time="2024-12-13T14:56:01.694558990Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:01.696827 env[1140]: time="2024-12-13T14:56:01.696769664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:01.699917 env[1140]: time="2024-12-13T14:56:01.699867073Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:01.702619 env[1140]: time="2024-12-13T14:56:01.702528598Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:01.704091 env[1140]: time="2024-12-13T14:56:01.704026799Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:56:01.706637 env[1140]: time="2024-12-13T14:56:01.706592447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:56:01.707978 env[1140]: time="2024-12-13T14:56:01.707919372Z" level=info msg="CreateContainer within sandbox \"bbde8dcd90a7a5dd0cd166ebac2743b660775c5f5d82ca6e994801563d3b5d19\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:56:01.731873 env[1140]: time="2024-12-13T14:56:01.731788742Z" level=info msg="CreateContainer within sandbox \"bbde8dcd90a7a5dd0cd166ebac2743b660775c5f5d82ca6e994801563d3b5d19\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"591eda73181d58d907eb47b85de309dfbdf9490218cae4da91d30dc3c47c19f3\"" Dec 13 14:56:01.732977 env[1140]: time="2024-12-13T14:56:01.732884091Z" level=info msg="StartContainer for \"591eda73181d58d907eb47b85de309dfbdf9490218cae4da91d30dc3c47c19f3\"" Dec 13 14:56:01.779627 systemd[1]: Started cri-containerd-591eda73181d58d907eb47b85de309dfbdf9490218cae4da91d30dc3c47c19f3.scope. Dec 13 14:56:01.797000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.797000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fb310867cb8 items=0 ppid=1560 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539316564613733313831643538643930376562343762383564653330 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.798000 audit: BPF prog-id=66 op=LOAD Dec 13 14:56:01.798000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003c2998 items=0 ppid=1560 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539316564613733313831643538643930376562343762383564653330 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.800000 audit: BPF prog-id=67 op=LOAD Dec 13 14:56:01.800000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003c29e8 items=0 ppid=1560 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539316564613733313831643538643930376562343762383564653330 Dec 13 14:56:01.802000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:56:01.802000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:01.802000 audit: BPF prog-id=68 op=LOAD Dec 13 14:56:01.802000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003c2a78 items=0 ppid=1560 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539316564613733313831643538643930376562343762383564653330 Dec 13 14:56:01.825539 env[1140]: time="2024-12-13T14:56:01.825405602Z" level=info msg="StartContainer for \"591eda73181d58d907eb47b85de309dfbdf9490218cae4da91d30dc3c47c19f3\" returns successfully" Dec 13 14:56:01.978000 audit[1766]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:01.981167 kernel: kauditd_printk_skb: 191 callbacks suppressed Dec 13 14:56:01.981307 kernel: audit: type=1325 audit(1734101761.978:476): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:01.986627 kernel: audit: type=1325 audit(1734101761.981:477): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:01.981000 audit[1767]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:01.981000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdae8b29e0 a2=0 a3=7ffdae8b29cc items=0 ppid=1720 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.001395 kernel: audit: type=1300 audit(1734101761.981:477): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdae8b29e0 a2=0 a3=7ffdae8b29cc items=0 ppid=1720 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:56:02.008629 kernel: audit: type=1327 audit(1734101761.981:477): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:56:01.981000 audit[1768]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:01.981000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd7e51090 a2=0 a3=7ffdd7e5107c items=0 ppid=1720 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.028033 kernel: audit: type=1325 audit(1734101761.981:478): table=nat:16 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.028134 kernel: audit: type=1300 audit(1734101761.981:478): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd7e51090 a2=0 a3=7ffdd7e5107c items=0 ppid=1720 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:56:02.032638 kernel: audit: type=1327 audit(1734101761.981:478): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:56:02.032722 kernel: audit: type=1300 audit(1734101761.978:476): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff33b50fc0 a2=0 a3=7fff33b50fac items=0 ppid=1720 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.978000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff33b50fc0 a2=0 a3=7fff33b50fac items=0 ppid=1720 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:56:02.040587 kernel: audit: type=1327 audit(1734101761.978:476): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:56:02.040663 kernel: audit: type=1325 audit(1734101761.986:479): table=filter:17 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:01.986000 audit[1769]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:01.986000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe44671e00 a2=0 a3=7ffe44671dec items=0 ppid=1720 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:56:01.996000 audit[1770]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:01.996000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec9bd1360 a2=0 a3=7ffec9bd134c items=0 ppid=1720 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:01.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:56:02.002000 audit[1771]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.002000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0cdcad10 a2=0 a3=7ffd0cdcacfc items=0 ppid=1720 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:56:02.092000 audit[1772]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.092000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe418f990 a2=0 a3=7fffe418f97c items=0 ppid=1720 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:56:02.098000 audit[1774]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.098000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffb423a300 a2=0 a3=7fffb423a2ec items=0 ppid=1720 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:56:02.107000 audit[1777]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.107000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff79b12b10 a2=0 a3=7fff79b12afc items=0 ppid=1720 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:56:02.109000 audit[1778]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.109000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf5455e50 a2=0 a3=7ffdf5455e3c items=0 ppid=1720 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:56:02.114000 audit[1780]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.114000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbbe80f80 a2=0 a3=7ffdbbe80f6c items=0 ppid=1720 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:56:02.116000 audit[1781]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.116000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8243f020 a2=0 a3=7ffe8243f00c items=0 ppid=1720 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:56:02.121000 audit[1783]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.121000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcae2b2870 a2=0 a3=7ffcae2b285c items=0 ppid=1720 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:56:02.127000 audit[1786]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.127000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd83adc450 a2=0 a3=7ffd83adc43c items=0 ppid=1720 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:56:02.130000 audit[1787]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.130000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd74bc18b0 a2=0 a3=7ffd74bc189c items=0 ppid=1720 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:56:02.134000 audit[1789]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.134000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdda827650 a2=0 a3=7ffdda82763c items=0 ppid=1720 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:56:02.136000 audit[1790]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.136000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb0ea2ef0 a2=0 a3=7ffeb0ea2edc items=0 ppid=1720 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:56:02.141000 audit[1792]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.141000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd60225e70 a2=0 a3=7ffd60225e5c items=0 ppid=1720 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:56:02.148000 audit[1795]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.148000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff67ad8800 a2=0 a3=7fff67ad87ec items=0 ppid=1720 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:56:02.161000 audit[1798]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.161000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd74687040 a2=0 a3=7ffd7468702c items=0 ppid=1720 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:56:02.165000 audit[1799]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.165000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdbec67170 a2=0 a3=7ffdbec6715c items=0 ppid=1720 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:56:02.171000 audit[1801]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.171000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff5023cb60 a2=0 a3=7fff5023cb4c items=0 ppid=1720 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:56:02.211000 audit[1805]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.211000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff2aa51030 a2=0 a3=7fff2aa5101c items=0 ppid=1720 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:56:02.213000 audit[1806]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.213000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef56ea350 a2=0 a3=7ffef56ea33c items=0 ppid=1720 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:56:02.216000 audit[1808]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:56:02.216000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed339e930 a2=0 a3=7ffed339e91c items=0 ppid=1720 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:56:02.236000 audit[1814]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:02.236000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffffa45b7e0 a2=0 a3=7ffffa45b7cc items=0 ppid=1720 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:02.269000 audit[1814]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:02.269000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffffa45b7e0 a2=0 a3=7ffffa45b7cc items=0 ppid=1720 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:02.282000 audit[1823]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.282000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6cc58bb0 a2=0 a3=7ffc6cc58b9c items=0 ppid=1720 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:56:02.285000 audit[1825]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.285000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe58790700 a2=0 a3=7ffe587906ec items=0 ppid=1720 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:56:02.290000 audit[1828]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.290000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4bc01970 a2=0 a3=7ffe4bc0195c items=0 ppid=1720 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:56:02.291000 audit[1829]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.291000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf2f1be00 a2=0 a3=7ffcf2f1bdec items=0 ppid=1720 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:56:02.294000 audit[1831]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.294000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0e98f420 a2=0 a3=7ffe0e98f40c items=0 ppid=1720 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:56:02.295000 audit[1832]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.295000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed1ca2200 a2=0 a3=7ffed1ca21ec items=0 ppid=1720 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:56:02.298000 audit[1834]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.298000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffef6b0ad10 a2=0 a3=7ffef6b0acfc items=0 ppid=1720 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:56:02.302000 audit[1837]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.302000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffca6924d50 a2=0 a3=7ffca6924d3c items=0 ppid=1720 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:56:02.304000 audit[1838]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.304000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffad5fd800 a2=0 a3=7fffad5fd7ec items=0 ppid=1720 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:56:02.306000 audit[1840]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.306000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4fa15530 a2=0 a3=7ffd4fa1551c items=0 ppid=1720 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:56:02.307000 audit[1841]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.307000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe76341f20 a2=0 a3=7ffe76341f0c items=0 ppid=1720 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:56:02.311000 audit[1843]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.311000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffebdcf690 a2=0 a3=7fffebdcf67c items=0 ppid=1720 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:56:02.316000 audit[1846]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.316000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1d905ea0 a2=0 a3=7fff1d905e8c items=0 ppid=1720 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:56:02.320000 audit[1849]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.320000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd44063bc0 a2=0 a3=7ffd44063bac items=0 ppid=1720 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:56:02.322000 audit[1850]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.322000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc02d5cb30 a2=0 a3=7ffc02d5cb1c items=0 ppid=1720 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:56:02.324000 audit[1852]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.324000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe57fe2c90 a2=0 a3=7ffe57fe2c7c items=0 ppid=1720 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:56:02.329000 audit[1855]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.329000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd97f16b40 a2=0 a3=7ffd97f16b2c items=0 ppid=1720 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:56:02.330000 audit[1856]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.330000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc73ffbf40 a2=0 a3=7ffc73ffbf2c items=0 ppid=1720 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:56:02.333000 audit[1858]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.333000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc2a395470 a2=0 a3=7ffc2a39545c items=0 ppid=1720 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:56:02.335000 audit[1859]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.335000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2856b1a0 a2=0 a3=7ffd2856b18c items=0 ppid=1720 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:56:02.338000 audit[1861]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.338000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda64381a0 a2=0 a3=7ffda643818c items=0 ppid=1720 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:56:02.344000 audit[1864]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:56:02.344000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec0996f70 a2=0 a3=7ffec0996f5c items=0 ppid=1720 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:56:02.350000 audit[1866]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:56:02.350000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd398eb6f0 a2=0 a3=7ffd398eb6dc items=0 ppid=1720 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.350000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:02.352000 audit[1866]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:56:02.352000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd398eb6f0 a2=0 a3=7ffd398eb6dc items=0 ppid=1720 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:02.352000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:02.561736 kubelet[1445]: E1213 14:56:02.561389 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:02.726471 systemd[1]: run-containerd-runc-k8s.io-591eda73181d58d907eb47b85de309dfbdf9490218cae4da91d30dc3c47c19f3-runc.ZY6BqL.mount: Deactivated successfully. Dec 13 14:56:02.769648 kubelet[1445]: E1213 14:56:02.769330 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:03.562618 kubelet[1445]: E1213 14:56:03.562477 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:04.563655 kubelet[1445]: E1213 14:56:04.563514 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:04.768506 kubelet[1445]: E1213 14:56:04.767866 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:05.563875 kubelet[1445]: E1213 14:56:05.563821 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:06.565631 kubelet[1445]: E1213 14:56:06.565551 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:06.767785 kubelet[1445]: E1213 14:56:06.767717 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:07.566634 kubelet[1445]: E1213 14:56:07.566548 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:08.567805 kubelet[1445]: E1213 14:56:08.567729 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:08.714983 env[1140]: time="2024-12-13T14:56:08.714866572Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:08.720696 env[1140]: time="2024-12-13T14:56:08.720633768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:08.724752 env[1140]: time="2024-12-13T14:56:08.724701674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:08.728754 env[1140]: time="2024-12-13T14:56:08.728700481Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:08.729770 env[1140]: time="2024-12-13T14:56:08.729710614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:56:08.735294 env[1140]: time="2024-12-13T14:56:08.735249137Z" level=info msg="CreateContainer within sandbox \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:56:08.751305 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount827806851.mount: Deactivated successfully. Dec 13 14:56:08.762829 env[1140]: time="2024-12-13T14:56:08.762701375Z" level=info msg="CreateContainer within sandbox \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9\"" Dec 13 14:56:08.763866 env[1140]: time="2024-12-13T14:56:08.763803018Z" level=info msg="StartContainer for \"7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9\"" Dec 13 14:56:08.767112 kubelet[1445]: E1213 14:56:08.767045 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:08.802872 systemd[1]: run-containerd-runc-k8s.io-7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9-runc.3qYrwc.mount: Deactivated successfully. Dec 13 14:56:08.809464 systemd[1]: Started cri-containerd-7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9.scope. Dec 13 14:56:08.832000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.836676 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 14:56:08.836758 kernel: audit: type=1400 audit(1734101768.832:527): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.832000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc780fd8c68 items=0 ppid=1549 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:08.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730383761636266396438343137326632386261343466356262373335 Dec 13 14:56:08.868324 kernel: audit: type=1300 audit(1734101768.832:527): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc780fd8c68 items=0 ppid=1549 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:08.868373 kernel: audit: type=1327 audit(1734101768.832:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730383761636266396438343137326632386261343466356262373335 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.876497 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.876599 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.885658 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.885702 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.885722 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.888930 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.892632 kernel: audit: type=1400 audit(1734101768.838:528): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.838000 audit: BPF prog-id=69 op=LOAD Dec 13 14:56:08.838000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003f22c8 items=0 ppid=1549 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:08.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730383761636266396438343137326632386261343466356262373335 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit: BPF prog-id=70 op=LOAD Dec 13 14:56:08.843000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003f2318 items=0 ppid=1549 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:08.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730383761636266396438343137326632386261343466356262373335 Dec 13 14:56:08.843000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:56:08.843000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:08.843000 audit: BPF prog-id=71 op=LOAD Dec 13 14:56:08.843000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003f23a8 items=0 ppid=1549 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:08.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730383761636266396438343137326632386261343466356262373335 Dec 13 14:56:08.906184 env[1140]: time="2024-12-13T14:56:08.906141894Z" level=info msg="StartContainer for \"7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9\" returns successfully" Dec 13 14:56:08.959437 kubelet[1445]: I1213 14:56:08.959260 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8hf4t" podStartSLOduration=11.246674977 podStartE2EDuration="15.959194004s" podCreationTimestamp="2024-12-13 14:55:53 +0000 UTC" firstStartedPulling="2024-12-13 14:55:56.993243771 +0000 UTC m=+4.877931131" lastFinishedPulling="2024-12-13 14:56:01.705762788 +0000 UTC m=+9.590450158" observedRunningTime="2024-12-13 14:56:01.946546006 +0000 UTC m=+9.831233396" watchObservedRunningTime="2024-12-13 14:56:08.959194004 +0000 UTC m=+16.843881414" Dec 13 14:56:09.568208 kubelet[1445]: E1213 14:56:09.568112 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:10.512226 env[1140]: time="2024-12-13T14:56:10.511984046Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:56:10.517317 systemd[1]: cri-containerd-7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9.scope: Deactivated successfully. Dec 13 14:56:10.521000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:56:10.569436 kubelet[1445]: E1213 14:56:10.569155 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:10.574431 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9-rootfs.mount: Deactivated successfully. Dec 13 14:56:10.598632 kubelet[1445]: I1213 14:56:10.597884 1445 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:56:10.780070 systemd[1]: Created slice kubepods-besteffort-podae47f13a_3f41_493f_8965_9006bf77c54f.slice. Dec 13 14:56:10.844322 env[1140]: time="2024-12-13T14:56:10.843309821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v58p7,Uid:ae47f13a-3f41-493f-8965-9006bf77c54f,Namespace:calico-system,Attempt:0,}" Dec 13 14:56:11.443973 env[1140]: time="2024-12-13T14:56:11.443851798Z" level=info msg="shim disconnected" id=7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9 Dec 13 14:56:11.443973 env[1140]: time="2024-12-13T14:56:11.443959708Z" level=warning msg="cleaning up after shim disconnected" id=7087acbf9d84172f28ba44f5bb735b3b38e82b195ffef599548fbefceb7a22e9 namespace=k8s.io Dec 13 14:56:11.443973 env[1140]: time="2024-12-13T14:56:11.443985165Z" level=info msg="cleaning up dead shim" Dec 13 14:56:11.486028 env[1140]: time="2024-12-13T14:56:11.485920359Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:56:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1916 runtime=io.containerd.runc.v2\n" Dec 13 14:56:11.569858 kubelet[1445]: E1213 14:56:11.569728 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:11.599578 env[1140]: time="2024-12-13T14:56:11.599454323Z" level=error msg="Failed to destroy network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:11.604964 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2-shm.mount: Deactivated successfully. Dec 13 14:56:11.606658 env[1140]: time="2024-12-13T14:56:11.606535132Z" level=error msg="encountered an error cleaning up failed sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:11.606757 env[1140]: time="2024-12-13T14:56:11.606695791Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v58p7,Uid:ae47f13a-3f41-493f-8965-9006bf77c54f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:11.607521 kubelet[1445]: E1213 14:56:11.607031 1445 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:11.607521 kubelet[1445]: E1213 14:56:11.607125 1445 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v58p7" Dec 13 14:56:11.607521 kubelet[1445]: E1213 14:56:11.607165 1445 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v58p7" Dec 13 14:56:11.607688 kubelet[1445]: E1213 14:56:11.607237 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-v58p7_calico-system(ae47f13a-3f41-493f-8965-9006bf77c54f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-v58p7_calico-system(ae47f13a-3f41-493f-8965-9006bf77c54f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:11.935714 kubelet[1445]: I1213 14:56:11.935634 1445 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:11.937348 env[1140]: time="2024-12-13T14:56:11.937191059Z" level=info msg="StopPodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\"" Dec 13 14:56:11.944443 env[1140]: time="2024-12-13T14:56:11.944232766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:56:12.026604 env[1140]: time="2024-12-13T14:56:12.026478671Z" level=error msg="StopPodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" failed" error="failed to destroy network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:12.027202 kubelet[1445]: E1213 14:56:12.027098 1445 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:12.027395 kubelet[1445]: E1213 14:56:12.027285 1445 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2"} Dec 13 14:56:12.027521 kubelet[1445]: E1213 14:56:12.027482 1445 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae47f13a-3f41-493f-8965-9006bf77c54f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:56:12.027671 kubelet[1445]: E1213 14:56:12.027617 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae47f13a-3f41-493f-8965-9006bf77c54f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v58p7" podUID="ae47f13a-3f41-493f-8965-9006bf77c54f" Dec 13 14:56:12.571122 kubelet[1445]: E1213 14:56:12.571023 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:13.554222 kubelet[1445]: E1213 14:56:13.554101 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:13.571702 kubelet[1445]: E1213 14:56:13.571640 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:14.388416 systemd[1]: Created slice kubepods-besteffort-podd9ba4a93_12d7_46f2_9c22_e860606a7145.slice. Dec 13 14:56:14.459129 kubelet[1445]: I1213 14:56:14.459033 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q5rcz\" (UniqueName: \"kubernetes.io/projected/d9ba4a93-12d7-46f2-9c22-e860606a7145-kube-api-access-q5rcz\") pod \"nginx-deployment-8587fbcb89-9vbrb\" (UID: \"d9ba4a93-12d7-46f2-9c22-e860606a7145\") " pod="default/nginx-deployment-8587fbcb89-9vbrb" Dec 13 14:56:14.572230 kubelet[1445]: E1213 14:56:14.572153 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:14.693041 env[1140]: time="2024-12-13T14:56:14.692913502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-9vbrb,Uid:d9ba4a93-12d7-46f2-9c22-e860606a7145,Namespace:default,Attempt:0,}" Dec 13 14:56:14.838348 env[1140]: time="2024-12-13T14:56:14.838293066Z" level=error msg="Failed to destroy network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:14.838846 env[1140]: time="2024-12-13T14:56:14.838812753Z" level=error msg="encountered an error cleaning up failed sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:14.839012 env[1140]: time="2024-12-13T14:56:14.838935061Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-9vbrb,Uid:d9ba4a93-12d7-46f2-9c22-e860606a7145,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:14.840169 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82-shm.mount: Deactivated successfully. Dec 13 14:56:14.842463 kubelet[1445]: E1213 14:56:14.842423 1445 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:14.842532 kubelet[1445]: E1213 14:56:14.842492 1445 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-9vbrb" Dec 13 14:56:14.842532 kubelet[1445]: E1213 14:56:14.842515 1445 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-9vbrb" Dec 13 14:56:14.842667 kubelet[1445]: E1213 14:56:14.842557 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-9vbrb_default(d9ba4a93-12d7-46f2-9c22-e860606a7145)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-9vbrb_default(d9ba4a93-12d7-46f2-9c22-e860606a7145)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-9vbrb" podUID="d9ba4a93-12d7-46f2-9c22-e860606a7145" Dec 13 14:56:14.951380 kubelet[1445]: I1213 14:56:14.951261 1445 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:14.953960 env[1140]: time="2024-12-13T14:56:14.953900891Z" level=info msg="StopPodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\"" Dec 13 14:56:15.035370 env[1140]: time="2024-12-13T14:56:15.035309668Z" level=error msg="StopPodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" failed" error="failed to destroy network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:56:15.035602 kubelet[1445]: E1213 14:56:15.035540 1445 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:15.035665 kubelet[1445]: E1213 14:56:15.035620 1445 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82"} Dec 13 14:56:15.035700 kubelet[1445]: E1213 14:56:15.035669 1445 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9ba4a93-12d7-46f2-9c22-e860606a7145\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:56:15.035811 kubelet[1445]: E1213 14:56:15.035700 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9ba4a93-12d7-46f2-9c22-e860606a7145\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-9vbrb" podUID="d9ba4a93-12d7-46f2-9c22-e860606a7145" Dec 13 14:56:15.572555 kubelet[1445]: E1213 14:56:15.572475 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:16.572939 kubelet[1445]: E1213 14:56:16.572801 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:17.573058 kubelet[1445]: E1213 14:56:17.572988 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:18.574037 kubelet[1445]: E1213 14:56:18.573968 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:19.574463 kubelet[1445]: E1213 14:56:19.574392 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:20.575172 kubelet[1445]: E1213 14:56:20.575037 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:21.576120 kubelet[1445]: E1213 14:56:21.576073 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:22.576973 kubelet[1445]: E1213 14:56:22.576929 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:23.369643 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3290480443.mount: Deactivated successfully. Dec 13 14:56:23.578119 kubelet[1445]: E1213 14:56:23.578030 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:24.028803 env[1140]: time="2024-12-13T14:56:24.028553528Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:24.033375 env[1140]: time="2024-12-13T14:56:24.033309022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:24.036888 env[1140]: time="2024-12-13T14:56:24.036825501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:24.040518 env[1140]: time="2024-12-13T14:56:24.040431869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:24.042630 env[1140]: time="2024-12-13T14:56:24.042495663Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:56:24.085679 env[1140]: time="2024-12-13T14:56:24.085488390Z" level=info msg="CreateContainer within sandbox \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:56:24.116526 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4112636572.mount: Deactivated successfully. Dec 13 14:56:24.128797 env[1140]: time="2024-12-13T14:56:24.128687971Z" level=info msg="CreateContainer within sandbox \"79ff05631aedc8a9ce0778f8bddfdc7e1f2520379e5bb1c10a6ed3338ae5029c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734\"" Dec 13 14:56:24.129732 env[1140]: time="2024-12-13T14:56:24.129662352Z" level=info msg="StartContainer for \"41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734\"" Dec 13 14:56:24.169075 systemd[1]: Started cri-containerd-41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734.scope. Dec 13 14:56:24.204000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.206881 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:56:24.206985 kernel: audit: type=1400 audit(1734101784.204:534): avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.226229 kernel: audit: type=1300 audit(1734101784.204:534): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4d345d2958 items=0 ppid=1549 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:24.226430 kernel: audit: type=1327 audit(1734101784.204:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431613135336233623539313036646430353266663939663062383835 Dec 13 14:56:24.204000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4d345d2958 items=0 ppid=1549 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:24.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431613135336233623539313036646430353266663939663062383835 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.230591 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.234758 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.239629 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.248697 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.253243 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.253315 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.253339 kernel: audit: type=1400 audit(1734101784.209:535): avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.209000 audit: BPF prog-id=72 op=LOAD Dec 13 14:56:24.209000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000341428 items=0 ppid=1549 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:24.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431613135336233623539313036646430353266663939663062383835 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.215000 audit: BPF prog-id=73 op=LOAD Dec 13 14:56:24.215000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000341478 items=0 ppid=1549 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:24.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431613135336233623539313036646430353266663939663062383835 Dec 13 14:56:24.224000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:56:24.224000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:24.224000 audit: BPF prog-id=74 op=LOAD Dec 13 14:56:24.224000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000341508 items=0 ppid=1549 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:24.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431613135336233623539313036646430353266663939663062383835 Dec 13 14:56:24.266031 env[1140]: time="2024-12-13T14:56:24.265977985Z" level=info msg="StartContainer for \"41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734\" returns successfully" Dec 13 14:56:24.352139 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:56:24.353172 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:56:24.578755 kubelet[1445]: E1213 14:56:24.578699 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:25.023649 kubelet[1445]: I1213 14:56:25.023318 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6m2cd" podStartSLOduration=4.935956307 podStartE2EDuration="32.023286278s" podCreationTimestamp="2024-12-13 14:55:53 +0000 UTC" firstStartedPulling="2024-12-13 14:55:56.959835125 +0000 UTC m=+4.844522486" lastFinishedPulling="2024-12-13 14:56:24.047165037 +0000 UTC m=+31.931852457" observedRunningTime="2024-12-13 14:56:25.023101343 +0000 UTC m=+32.907788753" watchObservedRunningTime="2024-12-13 14:56:25.023286278 +0000 UTC m=+32.907973689" Dec 13 14:56:25.028297 systemd[1]: run-containerd-runc-k8s.io-41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734-runc.GAb1h6.mount: Deactivated successfully. Dec 13 14:56:25.579857 kubelet[1445]: E1213 14:56:25.579806 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:25.967000 audit[2163]: AVC avc: denied { write } for pid=2163 comm="tee" name="fd" dev="proc" ino=19708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:25.967000 audit[2163]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2127ba10 a2=241 a3=1b6 items=1 ppid=2137 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:25.967000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:56:25.967000 audit: PATH item=0 name="/dev/fd/63" inode=19694 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:25.967000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:25.971000 audit[2170]: AVC avc: denied { write } for pid=2170 comm="tee" name="fd" dev="proc" ino=19715 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:25.971000 audit[2170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee6ddfa00 a2=241 a3=1b6 items=1 ppid=2140 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:25.971000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:56:25.971000 audit: PATH item=0 name="/dev/fd/63" inode=19062 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:25.971000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:25.973000 audit[2174]: AVC avc: denied { write } for pid=2174 comm="tee" name="fd" dev="proc" ino=19721 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:25.973000 audit[2174]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2d974a0f a2=241 a3=1b6 items=1 ppid=2135 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:25.973000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:56:25.973000 audit: PATH item=0 name="/dev/fd/63" inode=19707 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:25.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:25.974000 audit[2172]: AVC avc: denied { write } for pid=2172 comm="tee" name="fd" dev="proc" ino=19072 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:25.979000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=19727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:25.979000 audit[2176]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1a37aa0f a2=241 a3=1b6 items=1 ppid=2139 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:25.979000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:56:25.979000 audit: PATH item=0 name="/dev/fd/63" inode=19068 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:25.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:25.974000 audit[2172]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd397b9ff a2=241 a3=1b6 items=1 ppid=2138 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:25.974000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:56:25.974000 audit: PATH item=0 name="/dev/fd/63" inode=19065 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:25.974000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:26.008565 systemd[1]: run-containerd-runc-k8s.io-41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734-runc.WlAcEe.mount: Deactivated successfully. Dec 13 14:56:26.025000 audit[2181]: AVC avc: denied { write } for pid=2181 comm="tee" name="fd" dev="proc" ino=19762 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:26.025000 audit[2181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb17e4a11 a2=241 a3=1b6 items=1 ppid=2145 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.025000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:56:26.025000 audit: PATH item=0 name="/dev/fd/63" inode=19712 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:26.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:26.027000 audit[2190]: AVC avc: denied { write } for pid=2190 comm="tee" name="fd" dev="proc" ino=19766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:56:26.027000 audit[2190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7979aa0f a2=241 a3=1b6 items=1 ppid=2143 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.027000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:56:26.027000 audit: PATH item=0 name="/dev/fd/63" inode=19069 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:56:26.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.251000 audit: BPF prog-id=75 op=LOAD Dec 13 14:56:26.251000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa19cf8c0 a2=98 a3=3 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.251000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.253000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit: BPF prog-id=76 op=LOAD Dec 13 14:56:26.254000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa19cf6a0 a2=74 a3=540051 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.254000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.254000 audit: BPF prog-id=77 op=LOAD Dec 13 14:56:26.254000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa19cf6d0 a2=94 a3=2 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.254000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit: BPF prog-id=78 op=LOAD Dec 13 14:56:26.379000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa19cf590 a2=40 a3=1 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.379000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.379000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:56:26.379000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.379000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa19cf660 a2=50 a3=7fffa19cf740 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.379000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.389000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.389000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa19cf5a0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.389000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.389000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa19cf5d0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa19cf4e0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa19cf5f0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa19cf5d0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa19cf5c0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa19cf5f0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa19cf5d0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa19cf5f0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa19cf5c0 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa19cf630 a2=28 a3=0 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa19cf3e0 a2=50 a3=1 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit: BPF prog-id=79 op=LOAD Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa19cf3e0 a2=94 a3=5 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa19cf490 a2=50 a3=1 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa19cf5b0 a2=4 a3=38 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.390000 audit[2264]: AVC avc: denied { confidentiality } for pid=2264 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:56:26.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa19cf600 a2=94 a3=6 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { confidentiality } for pid=2264 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:56:26.391000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa19cedb0 a2=94 a3=83 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.391000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.391000 audit[2264]: AVC avc: denied { confidentiality } for pid=2264 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:56:26.391000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa19cedb0 a2=94 a3=83 items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.391000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit: BPF prog-id=80 op=LOAD Dec 13 14:56:26.401000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2b94ba60 a2=98 a3=1999999999999999 items=0 ppid=2136 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.401000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:56:26.401000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit: BPF prog-id=81 op=LOAD Dec 13 14:56:26.401000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2b94b940 a2=74 a3=ffff items=0 ppid=2136 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.401000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:56:26.401000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.401000 audit: BPF prog-id=82 op=LOAD Dec 13 14:56:26.401000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2b94b980 a2=40 a3=7ffe2b94bb60 items=0 ppid=2136 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.401000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:56:26.401000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:56:26.481944 systemd-networkd[969]: vxlan.calico: Link UP Dec 13 14:56:26.481963 systemd-networkd[969]: vxlan.calico: Gained carrier Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.518000 audit: BPF prog-id=83 op=LOAD Dec 13 14:56:26.518000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf91aeb20 a2=98 a3=ffff items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.518000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.527000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.527000 audit: BPF prog-id=84 op=LOAD Dec 13 14:56:26.527000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf91ae930 a2=74 a3=540051 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit: BPF prog-id=85 op=LOAD Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf91ae960 a2=94 a3=2 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf91ae830 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf91ae860 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf91ae770 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf91ae880 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf91ae860 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf91ae850 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf91ae880 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf91ae860 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf91ae880 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf91ae850 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.532000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.532000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf91ae8c0 a2=28 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit: BPF prog-id=86 op=LOAD Dec 13 14:56:26.533000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf91ae730 a2=40 a3=0 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.533000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdf91ae720 a2=50 a3=2800 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdf91ae720 a2=50 a3=2800 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.533000 audit: BPF prog-id=87 op=LOAD Dec 13 14:56:26.533000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf91adf40 a2=94 a3=2 items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.534000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.534000 audit: BPF prog-id=88 op=LOAD Dec 13 14:56:26.534000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf91ae040 a2=94 a3=2d items=0 ppid=2136 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.539000 audit: BPF prog-id=89 op=LOAD Dec 13 14:56:26.539000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdf8b40d0 a2=98 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.539000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.540000 audit: BPF prog-id=90 op=LOAD Dec 13 14:56:26.540000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdf8b3eb0 a2=74 a3=540051 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.541000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.541000 audit: BPF prog-id=91 op=LOAD Dec 13 14:56:26.541000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdf8b3ee0 a2=94 a3=2 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.541000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.541000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:56:26.581303 kubelet[1445]: E1213 14:56:26.581240 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit: BPF prog-id=92 op=LOAD Dec 13 14:56:26.689000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdf8b3da0 a2=40 a3=1 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.689000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:56:26.689000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.689000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcdf8b3e70 a2=50 a3=7ffcdf8b3f50 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdf8b3db0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdf8b3de0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdf8b3cf0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdf8b3e00 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdf8b3de0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdf8b3dd0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdf8b3e00 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdf8b3de0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdf8b3e00 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdf8b3dd0 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.699000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.699000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdf8b3e40 a2=28 a3=0 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdf8b3bf0 a2=50 a3=1 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit: BPF prog-id=93 op=LOAD Dec 13 14:56:26.700000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdf8b3bf0 a2=94 a3=5 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.700000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdf8b3ca0 a2=50 a3=1 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcdf8b3dc0 a2=4 a3=38 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { confidentiality } for pid=2301 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:56:26.700000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdf8b3e10 a2=94 a3=6 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.700000 audit[2301]: AVC avc: denied { confidentiality } for pid=2301 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:56:26.700000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdf8b35c0 a2=94 a3=83 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { confidentiality } for pid=2301 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:56:26.701000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdf8b35c0 a2=94 a3=83 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdf8b5000 a2=10 a3=f0f1 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdf8b4ea0 a2=10 a3=3 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdf8b4e40 a2=10 a3=3 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.701000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:26.701000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdf8b4e40 a2=10 a3=7 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:56:26.708000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:56:26.774918 env[1140]: time="2024-12-13T14:56:26.768400408Z" level=info msg="StopPodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\"" Dec 13 14:56:26.830000 audit[2341]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:26.830000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff567e0130 a2=0 a3=7fff567e011c items=0 ppid=2136 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:26.858000 audit[2339]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:26.858000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe72f48300 a2=0 a3=7ffe72f482ec items=0 ppid=2136 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.858000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:26.862000 audit[2346]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:26.862000 audit[2347]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:26.862000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdd7520050 a2=0 a3=7ffdd752003c items=0 ppid=2136 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.862000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:26.862000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd4fb22370 a2=0 a3=7ffd4fb2235c items=0 ppid=2136 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:26.862000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.038 [INFO][2336] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.039 [INFO][2336] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" iface="eth0" netns="/var/run/netns/cni-5a6a9828-4438-47f7-f91c-5398eb58b639" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.040 [INFO][2336] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" iface="eth0" netns="/var/run/netns/cni-5a6a9828-4438-47f7-f91c-5398eb58b639" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.043 [INFO][2336] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" iface="eth0" netns="/var/run/netns/cni-5a6a9828-4438-47f7-f91c-5398eb58b639" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.043 [INFO][2336] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.044 [INFO][2336] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.152 [INFO][2357] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.152 [INFO][2357] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.152 [INFO][2357] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.171 [WARNING][2357] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.171 [INFO][2357] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.175 [INFO][2357] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:27.188798 env[1140]: 2024-12-13 14:56:27.180 [INFO][2336] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:27.188304 systemd[1]: run-netns-cni\x2d5a6a9828\x2d4438\x2d47f7\x2df91c\x2d5398eb58b639.mount: Deactivated successfully. Dec 13 14:56:27.190967 env[1140]: time="2024-12-13T14:56:27.190865607Z" level=info msg="TearDown network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" successfully" Dec 13 14:56:27.191203 env[1140]: time="2024-12-13T14:56:27.191132747Z" level=info msg="StopPodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" returns successfully" Dec 13 14:56:27.193301 env[1140]: time="2024-12-13T14:56:27.193217774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v58p7,Uid:ae47f13a-3f41-493f-8965-9006bf77c54f,Namespace:calico-system,Attempt:1,}" Dec 13 14:56:27.438648 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie7b311903c8: link becomes ready Dec 13 14:56:27.442734 systemd-networkd[969]: calie7b311903c8: Link UP Dec 13 14:56:27.444982 systemd-networkd[969]: calie7b311903c8: Gained carrier Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.301 [INFO][2364] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.16-k8s-csi--node--driver--v58p7-eth0 csi-node-driver- calico-system ae47f13a-3f41-493f-8965-9006bf77c54f 1134 0 2024-12-13 14:55:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.16 csi-node-driver-v58p7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie7b311903c8 [] []}} ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.302 [INFO][2364] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.350 [INFO][2377] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" HandleID="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.373 [INFO][2377] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" HandleID="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318aa0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.16", "pod":"csi-node-driver-v58p7", "timestamp":"2024-12-13 14:56:27.350891503 +0000 UTC"}, Hostname:"172.24.4.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.373 [INFO][2377] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.373 [INFO][2377] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.373 [INFO][2377] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.16' Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.377 [INFO][2377] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.389 [INFO][2377] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.397 [INFO][2377] ipam/ipam.go 489: Trying affinity for 192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.400 [INFO][2377] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.403 [INFO][2377] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.403 [INFO][2377] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.192/26 handle="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.406 [INFO][2377] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838 Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.412 [INFO][2377] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.192/26 handle="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.424 [INFO][2377] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.193/26] block=192.168.55.192/26 handle="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.424 [INFO][2377] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.193/26] handle="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" host="172.24.4.16" Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.424 [INFO][2377] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:27.494090 env[1140]: 2024-12-13 14:56:27.424 [INFO][2377] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.193/26] IPv6=[] ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" HandleID="k8s-pod-network.a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.495764 env[1140]: 2024-12-13 14:56:27.428 [INFO][2364] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-csi--node--driver--v58p7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae47f13a-3f41-493f-8965-9006bf77c54f", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 55, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"", Pod:"csi-node-driver-v58p7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7b311903c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:27.495764 env[1140]: 2024-12-13 14:56:27.429 [INFO][2364] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.193/32] ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.495764 env[1140]: 2024-12-13 14:56:27.429 [INFO][2364] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie7b311903c8 ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.495764 env[1140]: 2024-12-13 14:56:27.448 [INFO][2364] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.495764 env[1140]: 2024-12-13 14:56:27.449 [INFO][2364] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-csi--node--driver--v58p7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae47f13a-3f41-493f-8965-9006bf77c54f", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 55, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838", Pod:"csi-node-driver-v58p7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7b311903c8", MAC:"4a:f2:86:a1:dd:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:27.495764 env[1140]: 2024-12-13 14:56:27.490 [INFO][2364] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838" Namespace="calico-system" Pod="csi-node-driver-v58p7" WorkloadEndpoint="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:27.496000 audit[2386]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:27.496000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffeb5759660 a2=0 a3=7ffeb575964c items=0 ppid=2136 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:27.496000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:27.511130 env[1140]: time="2024-12-13T14:56:27.510926666Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:56:27.511130 env[1140]: time="2024-12-13T14:56:27.510974224Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:56:27.511130 env[1140]: time="2024-12-13T14:56:27.510987810Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:56:27.511449 env[1140]: time="2024-12-13T14:56:27.511365155Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838 pid=2404 runtime=io.containerd.runc.v2 Dec 13 14:56:27.532401 systemd[1]: Started cri-containerd-a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838.scope. Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.544000 audit: BPF prog-id=94 op=LOAD Dec 13 14:56:27.545000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.545000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2404 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:27.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134613063623034343263343934383936626234643535353764653230 Dec 13 14:56:27.545000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.545000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2404 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:27.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134613063623034343263343934383936626234643535353764653230 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit: BPF prog-id=95 op=LOAD Dec 13 14:56:27.546000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001adc80 items=0 ppid=2404 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:27.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134613063623034343263343934383936626234643535353764653230 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.546000 audit: BPF prog-id=96 op=LOAD Dec 13 14:56:27.546000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001adcc8 items=0 ppid=2404 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:27.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134613063623034343263343934383936626234643535353764653230 Dec 13 14:56:27.547000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:56:27.547000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:27.547000 audit: BPF prog-id=97 op=LOAD Dec 13 14:56:27.547000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00022e0d8 items=0 ppid=2404 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:27.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134613063623034343263343934383936626234643535353764653230 Dec 13 14:56:27.562070 env[1140]: time="2024-12-13T14:56:27.562035820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v58p7,Uid:ae47f13a-3f41-493f-8965-9006bf77c54f,Namespace:calico-system,Attempt:1,} returns sandbox id \"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838\"" Dec 13 14:56:27.564266 env[1140]: time="2024-12-13T14:56:27.564200306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:56:27.568969 systemd-networkd[969]: vxlan.calico: Gained IPv6LL Dec 13 14:56:27.581765 kubelet[1445]: E1213 14:56:27.581697 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:28.189323 systemd[1]: run-containerd-runc-k8s.io-a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838-runc.U29ljR.mount: Deactivated successfully. Dec 13 14:56:28.582019 kubelet[1445]: E1213 14:56:28.581939 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:28.913404 systemd-networkd[969]: calie7b311903c8: Gained IPv6LL Dec 13 14:56:29.582887 kubelet[1445]: E1213 14:56:29.582814 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:29.721796 env[1140]: time="2024-12-13T14:56:29.721707922Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:29.723995 env[1140]: time="2024-12-13T14:56:29.723935518Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:29.727471 env[1140]: time="2024-12-13T14:56:29.727419283Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:29.731517 env[1140]: time="2024-12-13T14:56:29.731466902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:29.732166 env[1140]: time="2024-12-13T14:56:29.732104285Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:56:29.738747 env[1140]: time="2024-12-13T14:56:29.738716030Z" level=info msg="CreateContainer within sandbox \"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:56:29.761805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2453698079.mount: Deactivated successfully. Dec 13 14:56:29.763597 env[1140]: time="2024-12-13T14:56:29.763485533Z" level=info msg="CreateContainer within sandbox \"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"87657dd7438b11b0a0dd739726c66a2bace145aab951e275302ecdb76477d6fd\"" Dec 13 14:56:29.764940 env[1140]: time="2024-12-13T14:56:29.764888807Z" level=info msg="StartContainer for \"87657dd7438b11b0a0dd739726c66a2bace145aab951e275302ecdb76477d6fd\"" Dec 13 14:56:29.769312 env[1140]: time="2024-12-13T14:56:29.769281552Z" level=info msg="StopPodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\"" Dec 13 14:56:29.817922 systemd[1]: Started cri-containerd-87657dd7438b11b0a0dd739726c66a2bace145aab951e275302ecdb76477d6fd.scope. Dec 13 14:56:29.844667 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 14:56:29.844776 kernel: audit: type=1400 audit(1734101789.837:661): avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.837000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.850941 kernel: audit: type=1300 audit(1734101789.837:661): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4cd0e89948 items=0 ppid=2404 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:29.837000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4cd0e89948 items=0 ppid=2404 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:29.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363537646437343338623131623061306464373339373236633636 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.861504 kernel: audit: type=1327 audit(1734101789.837:661): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363537646437343338623131623061306464373339373236633636 Dec 13 14:56:29.866356 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.866390 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.866410 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.875628 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.875740 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.884656 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.891598 kernel: audit: type=1400 audit(1734101789.838:662): avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.838000 audit: BPF prog-id=98 op=LOAD Dec 13 14:56:29.838000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000399238 items=0 ppid=2404 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:29.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363537646437343338623131623061306464373339373236633636 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.844000 audit: BPF prog-id=99 op=LOAD Dec 13 14:56:29.844000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000399288 items=0 ppid=2404 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:29.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363537646437343338623131623061306464373339373236633636 Dec 13 14:56:29.849000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:56:29.849000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:29.849000 audit: BPF prog-id=100 op=LOAD Dec 13 14:56:29.849000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000399318 items=0 ppid=2404 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:29.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363537646437343338623131623061306464373339373236633636 Dec 13 14:56:29.902011 env[1140]: time="2024-12-13T14:56:29.901964520Z" level=info msg="StartContainer for \"87657dd7438b11b0a0dd739726c66a2bace145aab951e275302ecdb76477d6fd\" returns successfully" Dec 13 14:56:29.903932 env[1140]: time="2024-12-13T14:56:29.903894088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.881 [INFO][2466] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.881 [INFO][2466] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" iface="eth0" netns="/var/run/netns/cni-c298e43f-da60-345c-595f-505b896701e5" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.881 [INFO][2466] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" iface="eth0" netns="/var/run/netns/cni-c298e43f-da60-345c-595f-505b896701e5" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.882 [INFO][2466] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" iface="eth0" netns="/var/run/netns/cni-c298e43f-da60-345c-595f-505b896701e5" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.882 [INFO][2466] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.882 [INFO][2466] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.926 [INFO][2488] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.926 [INFO][2488] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.927 [INFO][2488] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.940 [WARNING][2488] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.940 [INFO][2488] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.943 [INFO][2488] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:29.945901 env[1140]: 2024-12-13 14:56:29.944 [INFO][2466] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:29.948367 systemd[1]: run-netns-cni\x2dc298e43f\x2dda60\x2d345c\x2d595f\x2d505b896701e5.mount: Deactivated successfully. Dec 13 14:56:29.949738 env[1140]: time="2024-12-13T14:56:29.948713828Z" level=info msg="TearDown network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" successfully" Dec 13 14:56:29.949738 env[1140]: time="2024-12-13T14:56:29.948750347Z" level=info msg="StopPodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" returns successfully" Dec 13 14:56:29.950502 env[1140]: time="2024-12-13T14:56:29.950463701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-9vbrb,Uid:d9ba4a93-12d7-46f2-9c22-e860606a7145,Namespace:default,Attempt:1,}" Dec 13 14:56:30.212989 systemd-networkd[969]: cali1a1b55b2929: Link UP Dec 13 14:56:30.219655 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:56:30.225765 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1a1b55b2929: link becomes ready Dec 13 14:56:30.225878 systemd-networkd[969]: cali1a1b55b2929: Gained carrier Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.021 [INFO][2502] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0 nginx-deployment-8587fbcb89- default d9ba4a93-12d7-46f2-9c22-e860606a7145 1147 0 2024-12-13 14:56:14 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.16 nginx-deployment-8587fbcb89-9vbrb eth0 default [] [] [kns.default ksa.default.default] cali1a1b55b2929 [] []}} ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.021 [INFO][2502] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.077 [INFO][2514] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" HandleID="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.102 [INFO][2514] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" HandleID="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cf150), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.16", "pod":"nginx-deployment-8587fbcb89-9vbrb", "timestamp":"2024-12-13 14:56:30.077497369 +0000 UTC"}, Hostname:"172.24.4.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.102 [INFO][2514] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.102 [INFO][2514] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.102 [INFO][2514] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.16' Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.108 [INFO][2514] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.118 [INFO][2514] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.130 [INFO][2514] ipam/ipam.go 489: Trying affinity for 192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.137 [INFO][2514] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.144 [INFO][2514] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.144 [INFO][2514] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.192/26 handle="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.148 [INFO][2514] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.176 [INFO][2514] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.192/26 handle="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.199 [INFO][2514] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.194/26] block=192.168.55.192/26 handle="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.199 [INFO][2514] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.194/26] handle="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" host="172.24.4.16" Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.199 [INFO][2514] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:30.262115 env[1140]: 2024-12-13 14:56:30.199 [INFO][2514] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.194/26] IPv6=[] ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" HandleID="k8s-pod-network.2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.266636 env[1140]: 2024-12-13 14:56:30.206 [INFO][2502] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d9ba4a93-12d7-46f2-9c22-e860606a7145", ResourceVersion:"1147", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-9vbrb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1a1b55b2929", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:30.266636 env[1140]: 2024-12-13 14:56:30.206 [INFO][2502] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.194/32] ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.266636 env[1140]: 2024-12-13 14:56:30.207 [INFO][2502] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1a1b55b2929 ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.266636 env[1140]: 2024-12-13 14:56:30.227 [INFO][2502] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.266636 env[1140]: 2024-12-13 14:56:30.227 [INFO][2502] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d9ba4a93-12d7-46f2-9c22-e860606a7145", ResourceVersion:"1147", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a", Pod:"nginx-deployment-8587fbcb89-9vbrb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1a1b55b2929", MAC:"9a:90:4f:37:24:c0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:30.266636 env[1140]: 2024-12-13 14:56:30.259 [INFO][2502] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a" Namespace="default" Pod="nginx-deployment-8587fbcb89-9vbrb" WorkloadEndpoint="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:30.296014 env[1140]: time="2024-12-13T14:56:30.295844595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:56:30.296394 env[1140]: time="2024-12-13T14:56:30.296293525Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:56:30.296814 env[1140]: time="2024-12-13T14:56:30.296712809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:56:30.294000 audit[2541]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:30.294000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcf1ea2990 a2=0 a3=7ffcf1ea297c items=0 ppid=2136 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:30.294000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:30.299085 env[1140]: time="2024-12-13T14:56:30.298086639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a pid=2543 runtime=io.containerd.runc.v2 Dec 13 14:56:30.331109 systemd[1]: Started cri-containerd-2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a.scope. Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.352000 audit: BPF prog-id=101 op=LOAD Dec 13 14:56:30.352000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.352000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2543 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:30.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363264336563316536303134373736613265383865353432326237 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2543 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:30.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363264336563316536303134373736613265383865353432326237 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.353000 audit: BPF prog-id=102 op=LOAD Dec 13 14:56:30.353000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003875f0 items=0 ppid=2543 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:30.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363264336563316536303134373736613265383865353432326237 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.355000 audit: BPF prog-id=103 op=LOAD Dec 13 14:56:30.355000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000387638 items=0 ppid=2543 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:30.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363264336563316536303134373736613265383865353432326237 Dec 13 14:56:30.355000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:56:30.356000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:30.356000 audit: BPF prog-id=104 op=LOAD Dec 13 14:56:30.356000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000387a48 items=0 ppid=2543 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:30.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363264336563316536303134373736613265383865353432326237 Dec 13 14:56:30.389150 env[1140]: time="2024-12-13T14:56:30.389108795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-9vbrb,Uid:d9ba4a93-12d7-46f2-9c22-e860606a7145,Namespace:default,Attempt:1,} returns sandbox id \"2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a\"" Dec 13 14:56:30.584326 kubelet[1445]: E1213 14:56:30.583425 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:31.584190 kubelet[1445]: E1213 14:56:31.584087 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:31.729137 systemd-networkd[969]: cali1a1b55b2929: Gained IPv6LL Dec 13 14:56:32.075139 env[1140]: time="2024-12-13T14:56:32.075063943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:32.081371 env[1140]: time="2024-12-13T14:56:32.081226393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:32.084875 env[1140]: time="2024-12-13T14:56:32.084249370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:32.088495 env[1140]: time="2024-12-13T14:56:32.088416367Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:32.091136 env[1140]: time="2024-12-13T14:56:32.091066125Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:56:32.095997 env[1140]: time="2024-12-13T14:56:32.095910629Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:56:32.099886 env[1140]: time="2024-12-13T14:56:32.099634046Z" level=info msg="CreateContainer within sandbox \"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:56:32.130268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2160861697.mount: Deactivated successfully. Dec 13 14:56:32.137887 env[1140]: time="2024-12-13T14:56:32.137803816Z" level=info msg="CreateContainer within sandbox \"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"21d13fcd3ec53eff1cb265e9b36c6caf65331d50543ec2fbbc7867eb4b92c33f\"" Dec 13 14:56:32.140280 env[1140]: time="2024-12-13T14:56:32.140189409Z" level=info msg="StartContainer for \"21d13fcd3ec53eff1cb265e9b36c6caf65331d50543ec2fbbc7867eb4b92c33f\"" Dec 13 14:56:32.196560 systemd[1]: Started cri-containerd-21d13fcd3ec53eff1cb265e9b36c6caf65331d50543ec2fbbc7867eb4b92c33f.scope. Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb4303c5b58 items=0 ppid=2404 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:32.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643133666364336563353365666631636232363565396233366336 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.216000 audit: BPF prog-id=105 op=LOAD Dec 13 14:56:32.216000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000349be8 items=0 ppid=2404 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:32.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643133666364336563353365666631636232363565396233366336 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.217000 audit: BPF prog-id=106 op=LOAD Dec 13 14:56:32.217000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000349c38 items=0 ppid=2404 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:32.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643133666364336563353365666631636232363565396233366336 Dec 13 14:56:32.219000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:56:32.219000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:32.219000 audit: BPF prog-id=107 op=LOAD Dec 13 14:56:32.219000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000349cc8 items=0 ppid=2404 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:32.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643133666364336563353365666631636232363565396233366336 Dec 13 14:56:32.242716 env[1140]: time="2024-12-13T14:56:32.242680680Z" level=info msg="StartContainer for \"21d13fcd3ec53eff1cb265e9b36c6caf65331d50543ec2fbbc7867eb4b92c33f\" returns successfully" Dec 13 14:56:32.585370 kubelet[1445]: E1213 14:56:32.585224 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:32.718024 kubelet[1445]: I1213 14:56:32.717125 1445 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:56:32.718024 kubelet[1445]: I1213 14:56:32.717176 1445 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:56:33.044427 kubelet[1445]: I1213 14:56:33.044248 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-v58p7" podStartSLOduration=35.513736553 podStartE2EDuration="40.044214258s" podCreationTimestamp="2024-12-13 14:55:53 +0000 UTC" firstStartedPulling="2024-12-13 14:56:27.563781404 +0000 UTC m=+35.448468764" lastFinishedPulling="2024-12-13 14:56:32.094259059 +0000 UTC m=+39.978946469" observedRunningTime="2024-12-13 14:56:33.042934813 +0000 UTC m=+40.927622223" watchObservedRunningTime="2024-12-13 14:56:33.044214258 +0000 UTC m=+40.928901668" Dec 13 14:56:33.554207 kubelet[1445]: E1213 14:56:33.554102 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:33.586537 kubelet[1445]: E1213 14:56:33.586433 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:34.587405 kubelet[1445]: E1213 14:56:34.587345 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:35.588437 kubelet[1445]: E1213 14:56:35.588305 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:36.139629 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1591529037.mount: Deactivated successfully. Dec 13 14:56:36.589065 kubelet[1445]: E1213 14:56:36.588979 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:37.589460 kubelet[1445]: E1213 14:56:37.589361 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:38.281909 env[1140]: time="2024-12-13T14:56:38.281749725Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:38.287113 env[1140]: time="2024-12-13T14:56:38.287034951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:38.291427 env[1140]: time="2024-12-13T14:56:38.291350151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:38.295877 env[1140]: time="2024-12-13T14:56:38.295805163Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:56:38.297296 env[1140]: time="2024-12-13T14:56:38.297236934Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:56:38.301827 env[1140]: time="2024-12-13T14:56:38.301768069Z" level=info msg="CreateContainer within sandbox \"2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:56:38.335401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2024964534.mount: Deactivated successfully. Dec 13 14:56:38.349438 env[1140]: time="2024-12-13T14:56:38.349327183Z" level=info msg="CreateContainer within sandbox \"2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3118b14cabfd27ad7405d3a7ab63ddc8ec3e429d5fc4dd688a6580bc2424bfb9\"" Dec 13 14:56:38.351044 env[1140]: time="2024-12-13T14:56:38.350978145Z" level=info msg="StartContainer for \"3118b14cabfd27ad7405d3a7ab63ddc8ec3e429d5fc4dd688a6580bc2424bfb9\"" Dec 13 14:56:38.414849 systemd[1]: Started cri-containerd-3118b14cabfd27ad7405d3a7ab63ddc8ec3e429d5fc4dd688a6580bc2424bfb9.scope. Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.429699 kernel: kauditd_printk_skb: 136 callbacks suppressed Dec 13 14:56:38.429755 kernel: audit: type=1400 audit(1734101798.426:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.432591 kernel: audit: type=1400 audit(1734101798.426:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.442557 kernel: audit: type=1400 audit(1734101798.426:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.442615 kernel: audit: type=1400 audit(1734101798.426:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.442640 kernel: audit: type=1400 audit(1734101798.426:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.450390 kernel: audit: type=1400 audit(1734101798.426:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.450447 kernel: audit: type=1400 audit(1734101798.426:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.460904 kernel: audit: type=1400 audit(1734101798.426:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.460970 kernel: audit: type=1400 audit(1734101798.426:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.461944 kernel: audit: type=1400 audit(1734101798.426:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.426000 audit: BPF prog-id=108 op=LOAD Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2543 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:38.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331313862313463616266643237616437343035643361376162363364 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2543 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:38.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331313862313463616266643237616437343035643361376162363364 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit: BPF prog-id=109 op=LOAD Dec 13 14:56:38.434000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030c370 items=0 ppid=2543 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:38.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331313862313463616266643237616437343035643361376162363364 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit: BPF prog-id=110 op=LOAD Dec 13 14:56:38.434000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030c3b8 items=0 ppid=2543 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:38.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331313862313463616266643237616437343035643361376162363364 Dec 13 14:56:38.434000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:56:38.434000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:38.434000 audit: BPF prog-id=111 op=LOAD Dec 13 14:56:38.434000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030c7c8 items=0 ppid=2543 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:38.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331313862313463616266643237616437343035643361376162363364 Dec 13 14:56:38.487383 env[1140]: time="2024-12-13T14:56:38.487325657Z" level=info msg="StartContainer for \"3118b14cabfd27ad7405d3a7ab63ddc8ec3e429d5fc4dd688a6580bc2424bfb9\" returns successfully" Dec 13 14:56:38.590618 kubelet[1445]: E1213 14:56:38.590254 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:39.323837 systemd[1]: run-containerd-runc-k8s.io-3118b14cabfd27ad7405d3a7ab63ddc8ec3e429d5fc4dd688a6580bc2424bfb9-runc.rBtGqK.mount: Deactivated successfully. Dec 13 14:56:39.590916 kubelet[1445]: E1213 14:56:39.590606 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:40.591755 kubelet[1445]: E1213 14:56:40.591686 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:41.592822 kubelet[1445]: E1213 14:56:41.592699 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:42.593744 kubelet[1445]: E1213 14:56:42.593628 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:43.594785 kubelet[1445]: E1213 14:56:43.594726 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:44.596619 kubelet[1445]: E1213 14:56:44.596516 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:45.598360 kubelet[1445]: E1213 14:56:45.598292 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:46.599476 kubelet[1445]: E1213 14:56:46.599407 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:47.600476 kubelet[1445]: E1213 14:56:47.600370 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:48.601516 kubelet[1445]: E1213 14:56:48.601366 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:49.602504 kubelet[1445]: E1213 14:56:49.602383 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:50.603627 kubelet[1445]: E1213 14:56:50.603504 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:51.604432 kubelet[1445]: E1213 14:56:51.604350 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:51.691642 systemd[1]: run-containerd-runc-k8s.io-41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734-runc.2F5R7N.mount: Deactivated successfully. Dec 13 14:56:51.947535 kubelet[1445]: I1213 14:56:51.946663 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-9vbrb" podStartSLOduration=30.038322978 podStartE2EDuration="37.946630817s" podCreationTimestamp="2024-12-13 14:56:14 +0000 UTC" firstStartedPulling="2024-12-13 14:56:30.390920484 +0000 UTC m=+38.275607844" lastFinishedPulling="2024-12-13 14:56:38.299228323 +0000 UTC m=+46.183915683" observedRunningTime="2024-12-13 14:56:39.060251076 +0000 UTC m=+46.944938486" watchObservedRunningTime="2024-12-13 14:56:51.946630817 +0000 UTC m=+59.831318227" Dec 13 14:56:52.605625 kubelet[1445]: E1213 14:56:52.605512 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:53.244877 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:56:53.245107 kernel: audit: type=1325 audit(1734101813.239:710): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.239000 audit[2719]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.239000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdcaca0fe0 a2=0 a3=7ffdcaca0fcc items=0 ppid=1720 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.265251 kernel: audit: type=1300 audit(1734101813.239:710): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdcaca0fe0 a2=0 a3=7ffdcaca0fcc items=0 ppid=1720 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.272635 kernel: audit: type=1327 audit(1734101813.239:710): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.272000 audit[2719]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.272000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdcaca0fe0 a2=0 a3=0 items=0 ppid=1720 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.294675 kernel: audit: type=1325 audit(1734101813.272:711): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.294832 kernel: audit: type=1300 audit(1734101813.272:711): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdcaca0fe0 a2=0 a3=0 items=0 ppid=1720 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.301007 kernel: audit: type=1327 audit(1734101813.272:711): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.308000 audit[2723]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.308000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc5c6feea0 a2=0 a3=7ffc5c6fee8c items=0 ppid=1720 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.319255 kernel: audit: type=1325 audit(1734101813.308:712): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.319408 kernel: audit: type=1300 audit(1734101813.308:712): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc5c6feea0 a2=0 a3=7ffc5c6fee8c items=0 ppid=1720 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.319470 kernel: audit: type=1327 audit(1734101813.308:712): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.323000 audit[2723]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.323000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc5c6feea0 a2=0 a3=0 items=0 ppid=1720 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:53.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:56:53.328628 kernel: audit: type=1325 audit(1734101813.323:713): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:56:53.502603 systemd[1]: Created slice kubepods-besteffort-pod3e4601ae_6b45_42bc_a439_0ea4d84f845e.slice. Dec 13 14:56:53.553992 kubelet[1445]: E1213 14:56:53.553931 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:53.607008 kubelet[1445]: E1213 14:56:53.606913 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:53.620666 env[1140]: time="2024-12-13T14:56:53.620499760Z" level=info msg="StopPodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\"" Dec 13 14:56:53.655097 kubelet[1445]: I1213 14:56:53.655010 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/3e4601ae-6b45-42bc-a439-0ea4d84f845e-data\") pod \"nfs-server-provisioner-0\" (UID: \"3e4601ae-6b45-42bc-a439-0ea4d84f845e\") " pod="default/nfs-server-provisioner-0" Dec 13 14:56:53.655465 kubelet[1445]: I1213 14:56:53.655113 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9kg7r\" (UniqueName: \"kubernetes.io/projected/3e4601ae-6b45-42bc-a439-0ea4d84f845e-kube-api-access-9kg7r\") pod \"nfs-server-provisioner-0\" (UID: \"3e4601ae-6b45-42bc-a439-0ea4d84f845e\") " pod="default/nfs-server-provisioner-0" Dec 13 14:56:53.811253 env[1140]: time="2024-12-13T14:56:53.811144103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3e4601ae-6b45-42bc-a439-0ea4d84f845e,Namespace:default,Attempt:0,}" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.731 [WARNING][2736] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d9ba4a93-12d7-46f2-9c22-e860606a7145", ResourceVersion:"1182", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a", Pod:"nginx-deployment-8587fbcb89-9vbrb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1a1b55b2929", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.732 [INFO][2736] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.732 [INFO][2736] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" iface="eth0" netns="" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.732 [INFO][2736] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.732 [INFO][2736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.813 [INFO][2743] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.813 [INFO][2743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.813 [INFO][2743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.840 [WARNING][2743] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.840 [INFO][2743] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.843 [INFO][2743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:53.848286 env[1140]: 2024-12-13 14:56:53.845 [INFO][2736] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.848918 env[1140]: time="2024-12-13T14:56:53.848331766Z" level=info msg="TearDown network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" successfully" Dec 13 14:56:53.848918 env[1140]: time="2024-12-13T14:56:53.848385758Z" level=info msg="StopPodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" returns successfully" Dec 13 14:56:53.849705 env[1140]: time="2024-12-13T14:56:53.849656025Z" level=info msg="RemovePodSandbox for \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\"" Dec 13 14:56:53.849798 env[1140]: time="2024-12-13T14:56:53.849723834Z" level=info msg="Forcibly stopping sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\"" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.922 [WARNING][2777] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d9ba4a93-12d7-46f2-9c22-e860606a7145", ResourceVersion:"1182", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"2e62d3ec1e6014776a2e88e5422b7af5513e8ebb44f05f70f926939076fbe46a", Pod:"nginx-deployment-8587fbcb89-9vbrb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1a1b55b2929", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.922 [INFO][2777] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.922 [INFO][2777] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" iface="eth0" netns="" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.922 [INFO][2777] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.922 [INFO][2777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.961 [INFO][2784] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.961 [INFO][2784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.961 [INFO][2784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.973 [WARNING][2784] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.973 [INFO][2784] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" HandleID="k8s-pod-network.2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Workload="172.24.4.16-k8s-nginx--deployment--8587fbcb89--9vbrb-eth0" Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.975 [INFO][2784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:53.978483 env[1140]: 2024-12-13 14:56:53.977 [INFO][2777] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82" Dec 13 14:56:53.979256 env[1140]: time="2024-12-13T14:56:53.978494802Z" level=info msg="TearDown network for sandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" successfully" Dec 13 14:56:53.982509 env[1140]: time="2024-12-13T14:56:53.982473231Z" level=info msg="RemovePodSandbox \"2cf7d9ea9eb8d62cbaca36058083f908130724b098ead3873e206f970379bf82\" returns successfully" Dec 13 14:56:53.983328 env[1140]: time="2024-12-13T14:56:53.983287096Z" level=info msg="StopPodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\"" Dec 13 14:56:54.051200 systemd-networkd[969]: cali60e51b789ff: Link UP Dec 13 14:56:54.056726 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:56:54.056857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:56:54.057118 systemd-networkd[969]: cali60e51b789ff: Gained carrier Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.909 [INFO][2753] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.16-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 3e4601ae-6b45-42bc-a439-0ea4d84f845e 1229 0 2024-12-13 14:56:53 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.16 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.910 [INFO][2753] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.974 [INFO][2789] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" HandleID="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Workload="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.990 [INFO][2789] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" HandleID="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Workload="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed3f0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.16", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:56:53.974440748 +0000 UTC"}, Hostname:"172.24.4.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.990 [INFO][2789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.990 [INFO][2789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.990 [INFO][2789] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.16' Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:53.993 [INFO][2789] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.000 [INFO][2789] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.007 [INFO][2789] ipam/ipam.go 489: Trying affinity for 192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.009 [INFO][2789] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.014 [INFO][2789] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.014 [INFO][2789] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.192/26 handle="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.016 [INFO][2789] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9 Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.027 [INFO][2789] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.192/26 handle="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.042 [INFO][2789] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.195/26] block=192.168.55.192/26 handle="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.042 [INFO][2789] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.195/26] handle="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" host="172.24.4.16" Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.042 [INFO][2789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:54.085817 env[1140]: 2024-12-13 14:56:54.042 [INFO][2789] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.195/26] IPv6=[] ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" HandleID="k8s-pod-network.a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Workload="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.086892 env[1140]: 2024-12-13 14:56:54.044 [INFO][2753] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3e4601ae-6b45-42bc-a439-0ea4d84f845e", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.55.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:54.086892 env[1140]: 2024-12-13 14:56:54.045 [INFO][2753] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.195/32] ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.086892 env[1140]: 2024-12-13 14:56:54.045 [INFO][2753] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.086892 env[1140]: 2024-12-13 14:56:54.058 [INFO][2753] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.087108 env[1140]: 2024-12-13 14:56:54.060 [INFO][2753] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3e4601ae-6b45-42bc-a439-0ea4d84f845e", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.55.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"f6:5d:fd:04:41:85", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:54.087108 env[1140]: 2024-12-13 14:56:54.083 [INFO][2753] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.16-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:56:54.119000 audit[2838]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:56:54.119000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff75c9f160 a2=0 a3=7fff75c9f14c items=0 ppid=2136 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:54.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:56:54.124451 env[1140]: time="2024-12-13T14:56:54.124370103Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:56:54.124451 env[1140]: time="2024-12-13T14:56:54.124423555Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:56:54.124678 env[1140]: time="2024-12-13T14:56:54.124628126Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:56:54.125643 env[1140]: time="2024-12-13T14:56:54.125130304Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9 pid=2847 runtime=io.containerd.runc.v2 Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.050 [WARNING][2810] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-csi--node--driver--v58p7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae47f13a-3f41-493f-8965-9006bf77c54f", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 55, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838", Pod:"csi-node-driver-v58p7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7b311903c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.050 [INFO][2810] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.051 [INFO][2810] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" iface="eth0" netns="" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.051 [INFO][2810] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.051 [INFO][2810] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.110 [INFO][2818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.110 [INFO][2818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.110 [INFO][2818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.133 [WARNING][2818] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.133 [INFO][2818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.138 [INFO][2818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:54.141664 env[1140]: 2024-12-13 14:56:54.139 [INFO][2810] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.142284 env[1140]: time="2024-12-13T14:56:54.141689578Z" level=info msg="TearDown network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" successfully" Dec 13 14:56:54.142284 env[1140]: time="2024-12-13T14:56:54.141739033Z" level=info msg="StopPodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" returns successfully" Dec 13 14:56:54.142284 env[1140]: time="2024-12-13T14:56:54.142255700Z" level=info msg="RemovePodSandbox for \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\"" Dec 13 14:56:54.142366 env[1140]: time="2024-12-13T14:56:54.142284084Z" level=info msg="Forcibly stopping sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\"" Dec 13 14:56:54.154920 systemd[1]: Started cri-containerd-a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9.scope. Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.172000 audit: BPF prog-id=112 op=LOAD Dec 13 14:56:54.173000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.173000 audit[2859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2847 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:54.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613637303865333561636335303065666235343738626265336130 Dec 13 14:56:54.173000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.173000 audit[2859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2847 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:54.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613637303865333561636335303065666235343738626265336130 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.174000 audit: BPF prog-id=113 op=LOAD Dec 13 14:56:54.174000 audit[2859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000380ce0 items=0 ppid=2847 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:54.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613637303865333561636335303065666235343738626265336130 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.175000 audit: BPF prog-id=114 op=LOAD Dec 13 14:56:54.175000 audit[2859]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000380d28 items=0 ppid=2847 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:54.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613637303865333561636335303065666235343738626265336130 Dec 13 14:56:54.176000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:56:54.176000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:56:54.176000 audit: BPF prog-id=115 op=LOAD Dec 13 14:56:54.176000 audit[2859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000381138 items=0 ppid=2847 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:56:54.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613637303865333561636335303065666235343738626265336130 Dec 13 14:56:54.216895 env[1140]: time="2024-12-13T14:56:54.216833180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3e4601ae-6b45-42bc-a439-0ea4d84f845e,Namespace:default,Attempt:0,} returns sandbox id \"a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9\"" Dec 13 14:56:54.220915 env[1140]: time="2024-12-13T14:56:54.220868725Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.232 [WARNING][2889] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-csi--node--driver--v58p7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ae47f13a-3f41-493f-8965-9006bf77c54f", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 55, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"a4a0cb0442c494896bb4d5557de202d202db1a4955d9b7ce5751618e43c36838", Pod:"csi-node-driver-v58p7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7b311903c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.232 [INFO][2889] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.232 [INFO][2889] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" iface="eth0" netns="" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.232 [INFO][2889] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.232 [INFO][2889] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.263 [INFO][2901] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.263 [INFO][2901] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.263 [INFO][2901] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.276 [WARNING][2901] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.276 [INFO][2901] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" HandleID="k8s-pod-network.31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Workload="172.24.4.16-k8s-csi--node--driver--v58p7-eth0" Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.278 [INFO][2901] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:56:54.281279 env[1140]: 2024-12-13 14:56:54.279 [INFO][2889] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2" Dec 13 14:56:54.282102 env[1140]: time="2024-12-13T14:56:54.282063185Z" level=info msg="TearDown network for sandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" successfully" Dec 13 14:56:54.285399 env[1140]: time="2024-12-13T14:56:54.285371671Z" level=info msg="RemovePodSandbox \"31daff1be9e837158411b25eb66cf9a75ccd1d8d49b5cd2aff1b1f5ac9b4e1f2\" returns successfully" Dec 13 14:56:54.607647 kubelet[1445]: E1213 14:56:54.607481 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:54.792628 systemd[1]: run-containerd-runc-k8s.io-a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9-runc.BqJAYj.mount: Deactivated successfully. Dec 13 14:56:55.607896 kubelet[1445]: E1213 14:56:55.607855 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:55.985421 systemd-networkd[969]: cali60e51b789ff: Gained IPv6LL Dec 13 14:56:56.608883 kubelet[1445]: E1213 14:56:56.608775 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:57.609466 kubelet[1445]: E1213 14:56:57.609358 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:58.610066 kubelet[1445]: E1213 14:56:58.609944 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:56:59.611211 kubelet[1445]: E1213 14:56:59.611081 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:00.611715 kubelet[1445]: E1213 14:57:00.611492 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:01.612297 kubelet[1445]: E1213 14:57:01.612219 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:02.613204 kubelet[1445]: E1213 14:57:02.613122 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:02.872474 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount20052925.mount: Deactivated successfully. Dec 13 14:57:03.613368 kubelet[1445]: E1213 14:57:03.613293 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:04.614104 kubelet[1445]: E1213 14:57:04.613988 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:05.614888 kubelet[1445]: E1213 14:57:05.614629 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:06.615144 kubelet[1445]: E1213 14:57:06.615080 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:07.182217 env[1140]: time="2024-12-13T14:57:07.182142068Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:07.186244 env[1140]: time="2024-12-13T14:57:07.186188994Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:07.189145 env[1140]: time="2024-12-13T14:57:07.189095494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:07.192114 env[1140]: time="2024-12-13T14:57:07.192057750Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:07.192968 env[1140]: time="2024-12-13T14:57:07.192931921Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:57:07.197308 env[1140]: time="2024-12-13T14:57:07.197230314Z" level=info msg="CreateContainer within sandbox \"a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:57:07.218788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1328197222.mount: Deactivated successfully. Dec 13 14:57:07.226786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1982193596.mount: Deactivated successfully. Dec 13 14:57:07.235639 env[1140]: time="2024-12-13T14:57:07.235596759Z" level=info msg="CreateContainer within sandbox \"a6a6708e35acc500efb5478bbe3a0172cffa13e5a21dff1bc2ddd9077f2807c9\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1941a2f7ea2ea8dd954224985b9670e30e8ce955f6d11403560f17efb5bb8749\"" Dec 13 14:57:07.236548 env[1140]: time="2024-12-13T14:57:07.236524360Z" level=info msg="StartContainer for \"1941a2f7ea2ea8dd954224985b9670e30e8ce955f6d11403560f17efb5bb8749\"" Dec 13 14:57:07.268273 systemd[1]: Started cri-containerd-1941a2f7ea2ea8dd954224985b9670e30e8ce955f6d11403560f17efb5bb8749.scope. Dec 13 14:57:07.298423 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:57:07.298532 kernel: audit: type=1400 audit(1734101827.290:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298561 kernel: audit: type=1400 audit(1734101827.290:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.308096 kernel: audit: type=1400 audit(1734101827.290:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.308348 kernel: audit: type=1400 audit(1734101827.290:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.308423 kernel: audit: type=1400 audit(1734101827.290:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.315154 kernel: audit: type=1400 audit(1734101827.290:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.315307 kernel: audit: type=1400 audit(1734101827.290:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.325186 kernel: audit: type=1400 audit(1734101827.290:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.325334 kernel: audit: type=1400 audit(1734101827.290:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.331100 kernel: audit: type=1400 audit(1734101827.290:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.290000 audit: BPF prog-id=116 op=LOAD Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2847 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:07.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343161326637656132656138646439353432323439383562393637 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2847 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:07.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343161326637656132656138646439353432323439383562393637 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit: BPF prog-id=117 op=LOAD Dec 13 14:57:07.298000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027bf60 items=0 ppid=2847 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:07.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343161326637656132656138646439353432323439383562393637 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit: BPF prog-id=118 op=LOAD Dec 13 14:57:07.298000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027bfa8 items=0 ppid=2847 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:07.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343161326637656132656138646439353432323439383562393637 Dec 13 14:57:07.298000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:57:07.298000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:07.298000 audit: BPF prog-id=119 op=LOAD Dec 13 14:57:07.298000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036e3b8 items=0 ppid=2847 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:07.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343161326637656132656138646439353432323439383562393637 Dec 13 14:57:07.352116 env[1140]: time="2024-12-13T14:57:07.352043294Z" level=info msg="StartContainer for \"1941a2f7ea2ea8dd954224985b9670e30e8ce955f6d11403560f17efb5bb8749\" returns successfully" Dec 13 14:57:07.411000 audit[2956]: AVC avc: denied { search } for pid=2956 comm="rpcbind" name="crypto" dev="proc" ino=22028 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:57:07.411000 audit[2956]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc32ac850c0 a2=0 a3=0 items=0 ppid=2939 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 key=(null) Dec 13 14:57:07.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:57:07.490000 audit[2961]: AVC avc: denied { search } for pid=2961 comm="dbus-daemon" name="crypto" dev="proc" ino=22028 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:57:07.490000 audit[2961]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fabd05560c0 a2=0 a3=0 items=0 ppid=2939 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 key=(null) Dec 13 14:57:07.490000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:57:07.495000 audit[2962]: AVC avc: denied { watch } for pid=2962 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538696 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c686,c854 tclass=dir permissive=0 Dec 13 14:57:07.495000 audit[2962]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55b89a064040 a2=2c8 a3=7ffecb41dc7c items=0 ppid=2939 pid=2962 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 key=(null) Dec 13 14:57:07.495000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:57:07.502000 audit[2963]: AVC avc: denied { read } for pid=2963 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23211 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:57:07.502000 audit[2963]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f12709fa320 a1=80000 a2=d a3=7ffffb6588d0 items=0 ppid=2939 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 key=(null) Dec 13 14:57:07.502000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:57:07.506000 audit[2963]: AVC avc: denied { search } for pid=2963 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22028 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:57:07.506000 audit[2963]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f126ff4e0c0 a2=0 a3=0 items=0 ppid=2939 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c854 key=(null) Dec 13 14:57:07.506000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:57:07.615874 kubelet[1445]: E1213 14:57:07.615769 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:08.315000 audit[2968]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:57:08.315000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd99ba02d0 a2=0 a3=7ffd99ba02bc items=0 ppid=1720 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:08.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:57:08.325000 audit[2968]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:57:08.325000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd99ba02d0 a2=0 a3=7ffd99ba02bc items=0 ppid=1720 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:08.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:57:08.616725 kubelet[1445]: E1213 14:57:08.616449 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:09.617669 kubelet[1445]: E1213 14:57:09.617538 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:10.618122 kubelet[1445]: E1213 14:57:10.618060 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:11.619378 kubelet[1445]: E1213 14:57:11.619315 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:12.621483 kubelet[1445]: E1213 14:57:12.621367 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:13.554156 kubelet[1445]: E1213 14:57:13.554070 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:13.621926 kubelet[1445]: E1213 14:57:13.621864 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:14.623752 kubelet[1445]: E1213 14:57:14.623671 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:15.624243 kubelet[1445]: E1213 14:57:15.624183 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:16.625867 kubelet[1445]: E1213 14:57:16.625803 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:17.626951 kubelet[1445]: E1213 14:57:17.626801 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:18.628005 kubelet[1445]: E1213 14:57:18.627899 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:19.628642 kubelet[1445]: E1213 14:57:19.628551 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:20.629261 kubelet[1445]: E1213 14:57:20.629135 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:21.629722 kubelet[1445]: E1213 14:57:21.629631 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:21.682482 systemd[1]: run-containerd-runc-k8s.io-41a153b3b59106dd052ff99f0b885f99a0d418c2441aaa03647d0deba18dd734-runc.vbdwUW.mount: Deactivated successfully. Dec 13 14:57:22.630383 kubelet[1445]: E1213 14:57:22.630321 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:23.631186 kubelet[1445]: E1213 14:57:23.631060 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:24.632486 kubelet[1445]: E1213 14:57:24.632304 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:25.633389 kubelet[1445]: E1213 14:57:25.633319 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:26.633944 kubelet[1445]: E1213 14:57:26.633886 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:27.635505 kubelet[1445]: E1213 14:57:27.635452 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:28.636833 kubelet[1445]: E1213 14:57:28.636780 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:29.638007 kubelet[1445]: E1213 14:57:29.637936 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:30.638709 kubelet[1445]: E1213 14:57:30.638658 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:31.640260 kubelet[1445]: E1213 14:57:31.640163 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:32.307085 kubelet[1445]: I1213 14:57:32.306992 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=26.331400261 podStartE2EDuration="39.306964279s" podCreationTimestamp="2024-12-13 14:56:53 +0000 UTC" firstStartedPulling="2024-12-13 14:56:54.219550828 +0000 UTC m=+62.104238188" lastFinishedPulling="2024-12-13 14:57:07.195114806 +0000 UTC m=+75.079802206" observedRunningTime="2024-12-13 14:57:08.223084206 +0000 UTC m=+76.107771617" watchObservedRunningTime="2024-12-13 14:57:32.306964279 +0000 UTC m=+100.191651689" Dec 13 14:57:32.327338 systemd[1]: Created slice kubepods-besteffort-pod9df118da_30cb_458a_963c_e938842434cc.slice. Dec 13 14:57:32.505459 kubelet[1445]: I1213 14:57:32.505357 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-66a92c4b-28a1-411a-903b-f28bd58f642b\" (UniqueName: \"kubernetes.io/nfs/9df118da-30cb-458a-963c-e938842434cc-pvc-66a92c4b-28a1-411a-903b-f28bd58f642b\") pod \"test-pod-1\" (UID: \"9df118da-30cb-458a-963c-e938842434cc\") " pod="default/test-pod-1" Dec 13 14:57:32.505751 kubelet[1445]: I1213 14:57:32.505461 1445 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x922p\" (UniqueName: \"kubernetes.io/projected/9df118da-30cb-458a-963c-e938842434cc-kube-api-access-x922p\") pod \"test-pod-1\" (UID: \"9df118da-30cb-458a-963c-e938842434cc\") " pod="default/test-pod-1" Dec 13 14:57:32.642758 kubelet[1445]: E1213 14:57:32.641690 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:32.706499 kernel: Failed to create system directory netfs Dec 13 14:57:32.707160 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:57:32.707288 kernel: audit: type=1400 audit(1734101852.669:758): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.707384 kernel: Failed to create system directory netfs Dec 13 14:57:32.707476 kernel: Failed to create system directory netfs Dec 13 14:57:32.707538 kernel: Failed to create system directory netfs Dec 13 14:57:32.707654 kernel: audit: type=1400 audit(1734101852.669:758): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.669000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.669000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.669000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.719798 kernel: audit: type=1400 audit(1734101852.669:758): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.669000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.729714 kernel: audit: type=1400 audit(1734101852.669:758): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.669000 audit[3014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564f74a595e0 a1=153bc a2=564f3f3472b0 a3=5 items=0 ppid=1002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:32.736658 kernel: audit: type=1300 audit(1734101852.669:758): arch=c000003e syscall=175 success=yes exit=0 a0=564f74a595e0 a1=153bc a2=564f3f3472b0 a3=5 items=0 ppid=1002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:32.669000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:57:32.738593 kernel: audit: type=1327 audit(1734101852.669:758): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:57:32.738623 kernel: Failed to create system directory fscache Dec 13 14:57:32.743734 kernel: audit: type=1400 audit(1734101852.728:759): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.743795 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.748600 kernel: audit: type=1400 audit(1734101852.728:759): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.748638 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.753231 kernel: audit: type=1400 audit(1734101852.728:759): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.753278 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.757823 kernel: audit: type=1400 audit(1734101852.728:759): avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.757867 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.759708 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.760754 kernel: Failed to create system directory fscache Dec 13 14:57:32.760824 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.761676 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.763455 kernel: Failed to create system directory fscache Dec 13 14:57:32.763489 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.768758 kernel: Failed to create system directory fscache Dec 13 14:57:32.768806 kernel: Failed to create system directory fscache Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.728000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.770621 kernel: Failed to create system directory fscache Dec 13 14:57:32.772625 kernel: FS-Cache: Loaded Dec 13 14:57:32.728000 audit[3014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564f74c6e9c0 a1=4c0fc a2=564f3f3472b0 a3=5 items=0 ppid=1002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:32.728000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.818467 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.818558 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.818656 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.819355 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.820252 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.821125 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.822034 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.822928 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.823816 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.824701 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.826463 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.826559 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.827338 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.828249 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.829121 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.830007 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.830890 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.831785 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.834406 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.834471 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.834818 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.835303 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.836184 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.837972 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.838058 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.838867 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.839773 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.840683 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.842382 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.842511 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.843271 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.844204 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.845075 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.845957 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.846885 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.847794 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.849563 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.849720 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.850430 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.851312 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.852189 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.853079 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.854048 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.854952 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.855824 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.856747 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.858512 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.858655 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.859339 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.860237 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.861134 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.862013 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.862913 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.863797 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.865553 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.865744 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.866422 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.867325 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.868178 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.869051 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.869937 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.870829 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.871745 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.873469 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.873653 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.874344 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.875219 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.876109 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.876988 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.877921 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.878780 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.880544 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.880713 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.881430 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.882314 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.883200 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.884167 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.884972 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.885857 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.886737 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.888504 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.888644 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.889369 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.890266 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.891158 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.892036 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.892906 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900183 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900347 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900446 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900506 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900558 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900639 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900683 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.900736 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.901149 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.903700 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.903845 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.903918 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.904521 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.906109 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.906429 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.907405 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.910153 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.910310 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.910490 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.911971 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.915344 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.915515 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.918540 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.918714 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.919488 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.920408 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.921632 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.922313 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.924947 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.925231 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.925304 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.927060 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.927163 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.928792 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.928942 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.929748 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.931774 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.931914 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.932555 kernel: Failed to create system directory sunrpc Dec 13 14:57:32.800000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.948508 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:57:32.948593 kernel: RPC: Registered udp transport module. Dec 13 14:57:32.948630 kernel: RPC: Registered tcp transport module. Dec 13 14:57:32.948655 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:57:32.800000 audit[3014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564f74cbaad0 a1=1a7f1c a2=564f3f3472b0 a3=5 items=6 ppid=1002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:32.800000 audit: CWD cwd="/" Dec 13 14:57:32.800000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:57:32.800000 audit: PATH item=1 name=(null) inode=22281 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:57:32.800000 audit: PATH item=2 name=(null) inode=22281 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:57:32.800000 audit: PATH item=3 name=(null) inode=22282 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:57:32.800000 audit: PATH item=4 name=(null) inode=22281 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:57:32.800000 audit: PATH item=5 name=(null) inode=22283 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:57:32.800000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.006682 kernel: Failed to create system directory nfs Dec 13 14:57:33.006832 kernel: Failed to create system directory nfs Dec 13 14:57:33.006886 kernel: Failed to create system directory nfs Dec 13 14:57:33.006932 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.007518 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.008484 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.009444 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.010370 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.011317 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.012419 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.013236 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.014153 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.015088 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.016125 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.017043 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.017972 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.018896 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.019850 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.020867 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.022116 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.022758 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.024739 kernel: Failed to create system directory nfs Dec 13 14:57:33.024867 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.025669 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.026518 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.027485 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.028352 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.029251 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.030097 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.030971 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.031794 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.033542 kernel: Failed to create system directory nfs Dec 13 14:57:33.033779 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.034394 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.035242 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.036089 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.036988 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.037852 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.041400 kernel: Failed to create system directory nfs Dec 13 14:57:33.041559 kernel: Failed to create system directory nfs Dec 13 14:57:33.041719 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.042314 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.043091 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.043912 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.044743 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.046422 kernel: Failed to create system directory nfs Dec 13 14:57:33.046597 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.050778 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.053124 kernel: Failed to create system directory nfs Dec 13 14:57:33.053355 kernel: Failed to create system directory nfs Dec 13 14:57:33.053489 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.054230 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.055040 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.055935 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.056757 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.058441 kernel: Failed to create system directory nfs Dec 13 14:57:33.058647 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.059308 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.060162 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.060999 kernel: Failed to create system directory nfs Dec 13 14:57:32.990000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.098465 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:57:32.990000 audit[3014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564f74edb700 a1=16e97c a2=564f3f3472b0 a3=5 items=0 ppid=1002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:32.990000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.198717 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.198876 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.200382 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.200509 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.201207 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.202039 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.202867 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.203740 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.205403 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.205528 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.207173 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.207295 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.208072 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.208843 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.209772 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.211464 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.211629 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.212306 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.213159 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.214148 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.215883 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.216008 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.216754 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.218508 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.218688 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.219389 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.220299 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.221174 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.221996 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.222923 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.224483 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.224624 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.226185 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.226303 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.227107 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.228214 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.230341 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.230482 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.232239 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.232382 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.233104 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.233865 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.234746 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.236417 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.236537 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.238227 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.238350 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.239971 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.240114 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.241768 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.241914 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.243421 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.243621 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.244351 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.245275 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.246056 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.247003 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.248764 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.248888 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.250452 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.250631 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.251347 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.252234 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.253933 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.254074 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.255771 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.255929 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.257463 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.257602 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.258311 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.259188 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.260083 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.261153 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.262097 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.265975 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.266259 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.266336 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.267027 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.267902 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.268789 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.270502 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.270645 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.271405 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.272303 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.273194 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.274054 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.274933 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.276799 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.276938 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.278457 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.278611 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.279328 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.280278 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.281191 kernel: Failed to create system directory nfs4 Dec 13 14:57:33.172000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.451775 kernel: NFS: Registering the id_resolver key type Dec 13 14:57:33.452089 kernel: Key type id_resolver registered Dec 13 14:57:33.455563 kernel: Key type id_legacy registered Dec 13 14:57:33.172000 audit[3019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f37b6a34010 a1=208de4 a2=55930a8c62b0 a3=5 items=0 ppid=1002 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:33.172000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.496476 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.496519 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.496604 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.503223 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.503270 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.503314 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.505461 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.507759 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.510014 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.512293 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.516776 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.516826 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.519047 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.521303 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.525943 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.525998 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.528264 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.530469 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.532665 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.536085 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.536127 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.537105 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.537969 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.538893 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.540792 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.540827 kernel: Failed to create system directory rpcgss Dec 13 14:57:33.480000 audit[3020]: AVC avc: denied { confidentiality } for pid=3020 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:57:33.480000 audit[3020]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa031933010 a1=70af4 a2=559181b0a2b0 a3=5 items=0 ppid=1002 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:33.480000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:57:33.554192 kubelet[1445]: E1213 14:57:33.554120 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:33.590851 nfsidmap[3029]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 14:57:33.600495 nfsidmap[3030]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Dec 13 14:57:33.611000 audit[1203]: AVC avc: denied { watch_reads } for pid=1203 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:57:33.611000 audit[1203]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d000cec480 a2=10 a3=ae562ef3f9c33353 items=0 ppid=1 pid=1203 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:33.611000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:57:33.611000 audit[1203]: AVC avc: denied { watch_reads } for pid=1203 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:57:33.611000 audit[1203]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d000cec480 a2=10 a3=ae562ef3f9c33353 items=0 ppid=1 pid=1203 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:33.611000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:57:33.611000 audit[1203]: AVC avc: denied { watch_reads } for pid=1203 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:57:33.611000 audit[1203]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d000cec480 a2=10 a3=ae562ef3f9c33353 items=0 ppid=1 pid=1203 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:33.611000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:57:33.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:57:33.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:57:33.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:57:33.643585 kubelet[1445]: E1213 14:57:33.643526 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:33.834731 env[1140]: time="2024-12-13T14:57:33.834647847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9df118da-30cb-458a-963c-e938842434cc,Namespace:default,Attempt:0,}" Dec 13 14:57:34.429177 systemd-networkd[969]: cali5ec59c6bf6e: Link UP Dec 13 14:57:34.441089 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:57:34.441232 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:57:34.448261 systemd-networkd[969]: cali5ec59c6bf6e: Gained carrier Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:33.970 [INFO][3032] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.16-k8s-test--pod--1-eth0 default 9df118da-30cb-458a-963c-e938842434cc 1347 0 2024-12-13 14:56:56 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.16 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:33.970 [INFO][3032] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.042 [INFO][3043] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" HandleID="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Workload="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.248 [INFO][3043] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" HandleID="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Workload="172.24.4.16-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050180), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.16", "pod":"test-pod-1", "timestamp":"2024-12-13 14:57:34.04235266 +0000 UTC"}, Hostname:"172.24.4.16", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.248 [INFO][3043] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.248 [INFO][3043] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.248 [INFO][3043] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.16' Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.253 [INFO][3043] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.263 [INFO][3043] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.273 [INFO][3043] ipam/ipam.go 489: Trying affinity for 192.168.55.192/26 host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.277 [INFO][3043] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.282 [INFO][3043] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.192/26 host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.282 [INFO][3043] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.192/26 handle="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.286 [INFO][3043] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65 Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.383 [INFO][3043] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.192/26 handle="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.409 [INFO][3043] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.196/26] block=192.168.55.192/26 handle="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.409 [INFO][3043] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.196/26] handle="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" host="172.24.4.16" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.409 [INFO][3043] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.409 [INFO][3043] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.196/26] IPv6=[] ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" HandleID="k8s-pod-network.883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Workload="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.481750 env[1140]: 2024-12-13 14:57:34.413 [INFO][3032] cni-plugin/k8s.go 386: Populated endpoint ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9df118da-30cb-458a-963c-e938842434cc", ResourceVersion:"1347", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:57:34.485411 env[1140]: 2024-12-13 14:57:34.413 [INFO][3032] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.196/32] ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.485411 env[1140]: 2024-12-13 14:57:34.414 [INFO][3032] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.485411 env[1140]: 2024-12-13 14:57:34.444 [INFO][3032] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.485411 env[1140]: 2024-12-13 14:57:34.452 [INFO][3032] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.16-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9df118da-30cb-458a-963c-e938842434cc", ResourceVersion:"1347", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 56, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.16", ContainerID:"883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.55.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ba:c7:65:31:e6:9e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:57:34.485411 env[1140]: 2024-12-13 14:57:34.477 [INFO][3032] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.16-k8s-test--pod--1-eth0" Dec 13 14:57:34.531000 audit[3065]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:57:34.531000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff48745500 a2=0 a3=7fff487454ec items=0 ppid=2136 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:34.531000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:57:34.542367 env[1140]: time="2024-12-13T14:57:34.542198341Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:57:34.542732 env[1140]: time="2024-12-13T14:57:34.542305323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:57:34.542732 env[1140]: time="2024-12-13T14:57:34.542477619Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:57:34.543450 env[1140]: time="2024-12-13T14:57:34.543218818Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65 pid=3073 runtime=io.containerd.runc.v2 Dec 13 14:57:34.566043 systemd[1]: Started cri-containerd-883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65.scope. Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.582000 audit: BPF prog-id=120 op=LOAD Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3073 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:34.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838336538373433303532663831373563303564333039393366393461 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3073 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:34.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838336538373433303532663831373563303564333039393366393461 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit: BPF prog-id=121 op=LOAD Dec 13 14:57:34.583000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dde00 items=0 ppid=3073 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:34.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838336538373433303532663831373563303564333039393366393461 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit: BPF prog-id=122 op=LOAD Dec 13 14:57:34.583000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dde48 items=0 ppid=3073 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:34.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838336538373433303532663831373563303564333039393366393461 Dec 13 14:57:34.583000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:57:34.583000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:34.583000 audit: BPF prog-id=123 op=LOAD Dec 13 14:57:34.583000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000342258 items=0 ppid=3073 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:34.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838336538373433303532663831373563303564333039393366393461 Dec 13 14:57:34.623028 env[1140]: time="2024-12-13T14:57:34.622972751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9df118da-30cb-458a-963c-e938842434cc,Namespace:default,Attempt:0,} returns sandbox id \"883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65\"" Dec 13 14:57:34.625461 env[1140]: time="2024-12-13T14:57:34.625426242Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:57:34.644166 kubelet[1445]: E1213 14:57:34.644096 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:35.082141 env[1140]: time="2024-12-13T14:57:35.081972855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:35.086750 env[1140]: time="2024-12-13T14:57:35.086678920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:35.091434 env[1140]: time="2024-12-13T14:57:35.091371097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:35.095693 env[1140]: time="2024-12-13T14:57:35.095558591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:57:35.097999 env[1140]: time="2024-12-13T14:57:35.097898919Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:57:35.106701 env[1140]: time="2024-12-13T14:57:35.106553146Z" level=info msg="CreateContainer within sandbox \"883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:57:35.167743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount948090392.mount: Deactivated successfully. Dec 13 14:57:35.169942 env[1140]: time="2024-12-13T14:57:35.169828140Z" level=info msg="CreateContainer within sandbox \"883e8743052f8175c05d30993f94aaf8b4c28d44c2b695c1a6ceb75327bc4a65\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e4203a8b221fdd6e962479032bea3f4c91df05e57ff7d8c61751d3aaf0759d25\"" Dec 13 14:57:35.172257 env[1140]: time="2024-12-13T14:57:35.172178407Z" level=info msg="StartContainer for \"e4203a8b221fdd6e962479032bea3f4c91df05e57ff7d8c61751d3aaf0759d25\"" Dec 13 14:57:35.205705 systemd[1]: Started cri-containerd-e4203a8b221fdd6e962479032bea3f4c91df05e57ff7d8c61751d3aaf0759d25.scope. Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.217000 audit: BPF prog-id=124 op=LOAD Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3073 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:35.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323033613862323231666464366539363234373930333262656133 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3073 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:35.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323033613862323231666464366539363234373930333262656133 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.218000 audit: BPF prog-id=125 op=LOAD Dec 13 14:57:35.218000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d7d00 items=0 ppid=3073 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:35.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323033613862323231666464366539363234373930333262656133 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.219000 audit: BPF prog-id=126 op=LOAD Dec 13 14:57:35.219000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d7d48 items=0 ppid=3073 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:35.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323033613862323231666464366539363234373930333262656133 Dec 13 14:57:35.219000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:57:35.220000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:57:35.220000 audit: BPF prog-id=127 op=LOAD Dec 13 14:57:35.220000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c6158 items=0 ppid=3073 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:57:35.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323033613862323231666464366539363234373930333262656133 Dec 13 14:57:35.239972 env[1140]: time="2024-12-13T14:57:35.239920354Z" level=info msg="StartContainer for \"e4203a8b221fdd6e962479032bea3f4c91df05e57ff7d8c61751d3aaf0759d25\" returns successfully" Dec 13 14:57:35.601358 systemd-networkd[969]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:57:35.644993 kubelet[1445]: E1213 14:57:35.644913 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:36.645397 kubelet[1445]: E1213 14:57:36.645321 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:37.646219 kubelet[1445]: E1213 14:57:37.646109 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:38.647486 kubelet[1445]: E1213 14:57:38.647402 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:39.649191 kubelet[1445]: E1213 14:57:39.649071 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:40.649775 kubelet[1445]: E1213 14:57:40.649687 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:41.650824 kubelet[1445]: E1213 14:57:41.650673 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:42.651638 kubelet[1445]: E1213 14:57:42.651400 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:43.652112 kubelet[1445]: E1213 14:57:43.652057 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:44.653219 kubelet[1445]: E1213 14:57:44.653162 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:45.655186 kubelet[1445]: E1213 14:57:45.655087 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:46.655931 kubelet[1445]: E1213 14:57:46.655807 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:47.656928 kubelet[1445]: E1213 14:57:47.656873 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:48.658698 kubelet[1445]: E1213 14:57:48.658640 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:49.660346 kubelet[1445]: E1213 14:57:49.660238 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:57:50.661070 kubelet[1445]: E1213 14:57:50.660940 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"