Dec 13 01:48:51.969168 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:48:51.969190 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:48:51.969200 kernel: BIOS-provided physical RAM map: Dec 13 01:48:51.969206 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:48:51.969211 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:48:51.969217 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:48:51.969224 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:48:51.969230 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:48:51.969236 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:48:51.969243 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:48:51.969249 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 01:48:51.969254 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:48:51.969260 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:48:51.969266 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:48:51.969273 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:48:51.969281 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:48:51.969287 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:48:51.969293 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:48:51.969299 kernel: NX (Execute Disable) protection: active Dec 13 01:48:51.969305 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:48:51.969312 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:48:51.969320 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:48:51.969327 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:48:51.969333 kernel: extended physical RAM map: Dec 13 01:48:51.969339 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:48:51.969346 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:48:51.969352 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:48:51.969358 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:48:51.969364 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:48:51.969370 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:48:51.969376 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:48:51.969382 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 01:48:51.969388 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 01:48:51.969394 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 01:48:51.969400 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 01:48:51.969406 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 01:48:51.969414 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:48:51.969420 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:48:51.969426 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:48:51.969432 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:48:51.969441 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:48:51.969447 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:48:51.969454 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:48:51.969461 kernel: efi: EFI v2.70 by EDK II Dec 13 01:48:51.969468 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 01:48:51.969474 kernel: random: crng init done Dec 13 01:48:51.969481 kernel: SMBIOS 2.8 present. Dec 13 01:48:51.969487 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 01:48:51.969494 kernel: Hypervisor detected: KVM Dec 13 01:48:51.969500 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 01:48:51.969507 kernel: kvm-clock: cpu 0, msr 3219b001, primary cpu clock Dec 13 01:48:51.969514 kernel: kvm-clock: using sched offset of 5244833379 cycles Dec 13 01:48:51.969524 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 01:48:51.969532 kernel: tsc: Detected 2794.748 MHz processor Dec 13 01:48:51.969541 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:48:51.969550 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:48:51.969558 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 01:48:51.969567 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:48:51.969576 kernel: Using GB pages for direct mapping Dec 13 01:48:51.969583 kernel: Secure boot disabled Dec 13 01:48:51.969590 kernel: ACPI: Early table checksum verification disabled Dec 13 01:48:51.969599 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 01:48:51.969605 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 01:48:51.969614 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:48:51.969623 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:48:51.969632 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 01:48:51.969641 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:48:51.969650 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:48:51.969662 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:48:51.969669 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:48:51.969679 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 01:48:51.969685 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 01:48:51.969692 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 01:48:51.969699 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 01:48:51.970542 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 01:48:51.970549 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 01:48:51.973383 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 01:48:51.973394 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 01:48:51.973400 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 01:48:51.973411 kernel: No NUMA configuration found Dec 13 01:48:51.973421 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 01:48:51.973428 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 01:48:51.973435 kernel: Zone ranges: Dec 13 01:48:51.973442 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:48:51.973448 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 01:48:51.973455 kernel: Normal empty Dec 13 01:48:51.973462 kernel: Movable zone start for each node Dec 13 01:48:51.973468 kernel: Early memory node ranges Dec 13 01:48:51.973476 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:48:51.973483 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 01:48:51.973490 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 01:48:51.973496 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 01:48:51.973503 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 01:48:51.973510 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 01:48:51.973517 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 01:48:51.973523 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:48:51.973530 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:48:51.973536 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 01:48:51.973544 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:48:51.973551 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 01:48:51.973558 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 01:48:51.973565 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 01:48:51.973571 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 01:48:51.973578 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 01:48:51.973585 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:48:51.973591 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 01:48:51.973598 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 01:48:51.973606 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:48:51.973612 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 01:48:51.973619 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 01:48:51.973630 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:48:51.973637 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 01:48:51.973646 kernel: TSC deadline timer available Dec 13 01:48:51.973653 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 01:48:51.973662 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 01:48:51.973669 kernel: kvm-guest: setup PV sched yield Dec 13 01:48:51.973677 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 01:48:51.973684 kernel: Booting paravirtualized kernel on KVM Dec 13 01:48:51.973696 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:48:51.973705 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 01:48:51.973713 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 01:48:51.973720 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 01:48:51.973727 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 01:48:51.973733 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 01:48:51.973741 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 01:48:51.973748 kernel: kvm-guest: PV spinlocks enabled Dec 13 01:48:51.973755 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:48:51.973762 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 01:48:51.973770 kernel: Policy zone: DMA32 Dec 13 01:48:51.973778 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:48:51.973786 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:48:51.973793 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:48:51.973801 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 01:48:51.973808 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:48:51.973816 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 169308K reserved, 0K cma-reserved) Dec 13 01:48:51.973823 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 01:48:51.973830 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:48:51.973837 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:48:51.973844 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:48:51.973852 kernel: rcu: RCU event tracing is enabled. Dec 13 01:48:51.973859 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 01:48:51.973867 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:48:51.973874 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:48:51.973881 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:48:51.973889 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 01:48:51.973896 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 01:48:51.973903 kernel: Console: colour dummy device 80x25 Dec 13 01:48:51.973910 kernel: printk: console [ttyS0] enabled Dec 13 01:48:51.973917 kernel: ACPI: Core revision 20210730 Dec 13 01:48:51.973924 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 01:48:51.973932 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:48:51.973939 kernel: x2apic enabled Dec 13 01:48:51.973946 kernel: Switched APIC routing to physical x2apic. Dec 13 01:48:51.973953 kernel: kvm-guest: setup PV IPIs Dec 13 01:48:51.973960 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 01:48:51.973984 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 01:48:51.973991 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 01:48:51.973999 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 01:48:51.974006 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 01:48:51.974015 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 01:48:51.974022 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:48:51.974031 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:48:51.974039 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:48:51.974046 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:48:51.974059 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 01:48:51.974066 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 01:48:51.974076 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 01:48:51.974083 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 01:48:51.974092 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:48:51.974099 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:48:51.974106 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:48:51.974113 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:48:51.974121 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 01:48:51.974128 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:48:51.974135 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:48:51.974142 kernel: LSM: Security Framework initializing Dec 13 01:48:51.974149 kernel: SELinux: Initializing. Dec 13 01:48:51.974161 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:48:51.974172 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:48:51.974180 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 01:48:51.974187 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 01:48:51.974194 kernel: ... version: 0 Dec 13 01:48:51.974201 kernel: ... bit width: 48 Dec 13 01:48:51.974999 kernel: ... generic registers: 6 Dec 13 01:48:51.975006 kernel: ... value mask: 0000ffffffffffff Dec 13 01:48:51.977792 kernel: ... max period: 00007fffffffffff Dec 13 01:48:51.977802 kernel: ... fixed-purpose events: 0 Dec 13 01:48:51.977809 kernel: ... event mask: 000000000000003f Dec 13 01:48:51.977816 kernel: signal: max sigframe size: 1776 Dec 13 01:48:51.977823 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:48:51.977830 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:48:51.977837 kernel: x86: Booting SMP configuration: Dec 13 01:48:51.977844 kernel: .... node #0, CPUs: #1 Dec 13 01:48:51.977851 kernel: kvm-clock: cpu 1, msr 3219b041, secondary cpu clock Dec 13 01:48:51.977859 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 01:48:51.977868 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 01:48:51.977875 kernel: #2 Dec 13 01:48:51.977882 kernel: kvm-clock: cpu 2, msr 3219b081, secondary cpu clock Dec 13 01:48:51.977889 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 01:48:51.977896 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 01:48:51.977903 kernel: #3 Dec 13 01:48:51.977910 kernel: kvm-clock: cpu 3, msr 3219b0c1, secondary cpu clock Dec 13 01:48:51.977917 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 01:48:51.977924 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 01:48:51.977932 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 01:48:51.977939 kernel: smpboot: Max logical packages: 1 Dec 13 01:48:51.977947 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 01:48:51.977954 kernel: devtmpfs: initialized Dec 13 01:48:51.977964 kernel: x86/mm: Memory block size: 128MB Dec 13 01:48:51.977980 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 01:48:51.977987 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 01:48:51.977994 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 01:48:51.978001 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 01:48:51.978010 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 01:48:51.978017 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:48:51.978024 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 01:48:51.978031 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:48:51.978039 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:48:51.978046 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:48:51.978059 kernel: audit: type=2000 audit(1734054531.502:1): state=initialized audit_enabled=0 res=1 Dec 13 01:48:51.978067 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:48:51.978074 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:48:51.978083 kernel: cpuidle: using governor menu Dec 13 01:48:51.978090 kernel: ACPI: bus type PCI registered Dec 13 01:48:51.978097 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:48:51.978104 kernel: dca service started, version 1.12.1 Dec 13 01:48:51.978111 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 01:48:51.978118 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 01:48:51.978125 kernel: PCI: Using configuration type 1 for base access Dec 13 01:48:51.978132 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:48:51.978139 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:48:51.978148 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:48:51.978155 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:48:51.978162 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:48:51.978169 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:48:51.978176 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:48:51.978183 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:48:51.978190 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:48:51.978197 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:48:51.978204 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:48:51.978212 kernel: ACPI: Interpreter enabled Dec 13 01:48:51.978219 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 01:48:51.978226 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:48:51.978233 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:48:51.978240 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 01:48:51.978247 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 01:48:51.978385 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 01:48:51.978462 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 01:48:51.978539 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 01:48:51.978548 kernel: PCI host bridge to bus 0000:00 Dec 13 01:48:51.978661 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 01:48:51.982485 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 01:48:51.982560 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 01:48:51.982625 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 01:48:51.982691 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 01:48:51.982760 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 01:48:51.982826 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 01:48:51.982924 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 01:48:51.983026 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 01:48:51.983111 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 01:48:51.983186 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 01:48:51.983268 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 01:48:51.984083 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 01:48:51.984194 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 01:48:51.984311 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 01:48:51.984413 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 01:48:51.984510 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 01:48:51.984604 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 01:48:51.984717 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 01:48:51.984814 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 01:48:51.984935 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 01:48:51.985046 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 01:48:51.985172 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 01:48:51.985292 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 01:48:51.985391 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 01:48:51.985504 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 01:48:51.985612 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 01:48:51.985734 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 01:48:51.985843 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 01:48:51.985935 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 01:48:51.986023 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 01:48:51.986106 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 01:48:51.986201 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 01:48:51.986275 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 01:48:51.986285 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 01:48:51.986293 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 01:48:51.986300 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 01:48:51.986307 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 01:48:51.986314 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 01:48:51.986321 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 01:48:51.986331 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 01:48:51.986338 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 01:48:51.986346 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 01:48:51.986353 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 01:48:51.986360 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 01:48:51.986367 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 01:48:51.986374 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 01:48:51.986381 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 01:48:51.986388 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 01:48:51.986397 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 01:48:51.986404 kernel: iommu: Default domain type: Translated Dec 13 01:48:51.986411 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:48:51.986485 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 01:48:51.986558 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 01:48:51.986632 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 01:48:51.986641 kernel: vgaarb: loaded Dec 13 01:48:51.986649 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:48:51.986658 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:48:51.986665 kernel: PTP clock support registered Dec 13 01:48:51.986673 kernel: Registered efivars operations Dec 13 01:48:51.986680 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:48:51.986687 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 01:48:51.986694 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 01:48:51.986701 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 01:48:51.986708 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 01:48:51.986715 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 01:48:51.986722 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 01:48:51.986731 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 01:48:51.986738 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 01:48:51.986745 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 01:48:51.986752 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 01:48:51.986759 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:48:51.986766 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:48:51.986773 kernel: pnp: PnP ACPI init Dec 13 01:48:51.986867 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 01:48:51.986881 kernel: pnp: PnP ACPI: found 6 devices Dec 13 01:48:51.986889 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:48:51.986896 kernel: NET: Registered PF_INET protocol family Dec 13 01:48:51.986903 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:48:51.986911 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 01:48:51.986918 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:48:51.986925 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 01:48:51.986932 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 01:48:51.986941 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 01:48:51.986948 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:48:51.986956 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:48:51.986963 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:48:51.986988 kernel: NET: Registered PF_XDP protocol family Dec 13 01:48:51.987083 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 01:48:51.987160 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 01:48:51.987230 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 01:48:51.987301 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 01:48:51.987368 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 01:48:51.987433 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 01:48:51.987499 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 01:48:51.987564 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 01:48:51.987574 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:48:51.987581 kernel: Initialise system trusted keyrings Dec 13 01:48:51.987588 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 01:48:51.987596 kernel: Key type asymmetric registered Dec 13 01:48:51.987605 kernel: Asymmetric key parser 'x509' registered Dec 13 01:48:51.987612 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:48:51.987630 kernel: io scheduler mq-deadline registered Dec 13 01:48:51.987639 kernel: io scheduler kyber registered Dec 13 01:48:51.987646 kernel: io scheduler bfq registered Dec 13 01:48:51.987654 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:48:51.987662 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 01:48:51.987669 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 01:48:51.987677 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 01:48:51.987685 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:48:51.987693 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:48:51.987701 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 01:48:51.987708 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 01:48:51.987716 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 01:48:51.987723 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 01:48:51.987817 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 01:48:51.987889 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 01:48:51.987960 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T01:48:51 UTC (1734054531) Dec 13 01:48:51.988046 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 01:48:51.988065 kernel: efifb: probing for efifb Dec 13 01:48:51.988073 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 01:48:51.988081 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 01:48:51.988089 kernel: efifb: scrolling: redraw Dec 13 01:48:51.988096 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:48:51.988103 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 01:48:51.988111 kernel: fb0: EFI VGA frame buffer device Dec 13 01:48:51.988122 kernel: pstore: Registered efi as persistent store backend Dec 13 01:48:51.988129 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:48:51.988137 kernel: Segment Routing with IPv6 Dec 13 01:48:51.988145 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:48:51.988153 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:48:51.988162 kernel: Key type dns_resolver registered Dec 13 01:48:51.988169 kernel: IPI shorthand broadcast: enabled Dec 13 01:48:51.988177 kernel: sched_clock: Marking stable (480197675, 130446503)->(631707743, -21063565) Dec 13 01:48:51.988184 kernel: registered taskstats version 1 Dec 13 01:48:51.988191 kernel: Loading compiled-in X.509 certificates Dec 13 01:48:51.988199 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:48:51.988206 kernel: Key type .fscrypt registered Dec 13 01:48:51.988214 kernel: Key type fscrypt-provisioning registered Dec 13 01:48:51.988221 kernel: pstore: Using crash dump compression: deflate Dec 13 01:48:51.988230 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:48:51.988237 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:48:51.988245 kernel: ima: No architecture policies found Dec 13 01:48:51.988252 kernel: clk: Disabling unused clocks Dec 13 01:48:51.988260 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:48:51.988267 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:48:51.988275 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:48:51.988283 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:48:51.988290 kernel: Run /init as init process Dec 13 01:48:51.988299 kernel: with arguments: Dec 13 01:48:51.988306 kernel: /init Dec 13 01:48:51.988314 kernel: with environment: Dec 13 01:48:51.988321 kernel: HOME=/ Dec 13 01:48:51.988328 kernel: TERM=linux Dec 13 01:48:51.988336 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:48:51.988345 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:48:51.988355 systemd[1]: Detected virtualization kvm. Dec 13 01:48:51.988365 systemd[1]: Detected architecture x86-64. Dec 13 01:48:51.988372 systemd[1]: Running in initrd. Dec 13 01:48:51.988380 systemd[1]: No hostname configured, using default hostname. Dec 13 01:48:51.988388 systemd[1]: Hostname set to . Dec 13 01:48:51.988396 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:48:51.988404 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:48:51.988413 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:48:51.988420 systemd[1]: Reached target cryptsetup.target. Dec 13 01:48:51.988429 systemd[1]: Reached target paths.target. Dec 13 01:48:51.988437 systemd[1]: Reached target slices.target. Dec 13 01:48:51.988445 systemd[1]: Reached target swap.target. Dec 13 01:48:51.988453 systemd[1]: Reached target timers.target. Dec 13 01:48:51.988461 systemd[1]: Listening on iscsid.socket. Dec 13 01:48:51.988470 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:48:51.988478 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:48:51.988486 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:48:51.988495 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:48:51.988503 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:48:51.988511 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:48:51.988519 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:48:51.988527 systemd[1]: Reached target sockets.target. Dec 13 01:48:51.988535 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:48:51.988543 systemd[1]: Finished network-cleanup.service. Dec 13 01:48:51.988551 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:48:51.988559 systemd[1]: Starting systemd-journald.service... Dec 13 01:48:51.988568 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:48:51.988576 systemd[1]: Starting systemd-resolved.service... Dec 13 01:48:51.988585 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:48:51.988593 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:48:51.988601 kernel: audit: type=1130 audit(1734054531.970:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.988609 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:48:51.988617 kernel: audit: type=1130 audit(1734054531.974:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.988625 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:48:51.988634 kernel: audit: type=1130 audit(1734054531.978:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.988643 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:48:51.988653 systemd-journald[198]: Journal started Dec 13 01:48:51.988693 systemd-journald[198]: Runtime Journal (/run/log/journal/c72de6de51724db8920e85fbdd2efdd6) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:48:51.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.968916 systemd-modules-load[199]: Inserted module 'overlay' Dec 13 01:48:51.997040 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:48:51.997072 systemd[1]: Started systemd-journald.service. Dec 13 01:48:51.997083 kernel: audit: type=1130 audit(1734054531.995:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:51.993502 systemd-resolved[200]: Positive Trust Anchors: Dec 13 01:48:51.993535 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:48:51.993562 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:48:51.995760 systemd-resolved[200]: Defaulting to hostname 'linux'. Dec 13 01:48:51.996532 systemd[1]: Started systemd-resolved.service. Dec 13 01:48:52.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.010901 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:48:52.018153 kernel: audit: type=1130 audit(1734054532.008:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.018177 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:48:52.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.020311 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:48:52.025555 kernel: audit: type=1130 audit(1734054532.019:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.025579 kernel: Bridge firewalling registered Dec 13 01:48:52.025603 kernel: audit: type=1130 audit(1734054532.022:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.023941 systemd-modules-load[199]: Inserted module 'br_netfilter' Dec 13 01:48:52.024198 systemd[1]: Reached target nss-lookup.target. Dec 13 01:48:52.032696 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:48:52.077011 kernel: SCSI subsystem initialized Dec 13 01:48:52.083029 dracut-cmdline[217]: dracut-dracut-053 Dec 13 01:48:52.085876 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:48:52.093304 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:48:52.093329 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:48:52.094593 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:48:52.097458 systemd-modules-load[199]: Inserted module 'dm_multipath' Dec 13 01:48:52.098323 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:48:52.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.099189 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:48:52.104384 kernel: audit: type=1130 audit(1734054532.097:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.109139 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:48:52.113611 kernel: audit: type=1130 audit(1734054532.109:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.150000 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:48:52.165994 kernel: iscsi: registered transport (tcp) Dec 13 01:48:52.187491 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:48:52.187524 kernel: QLogic iSCSI HBA Driver Dec 13 01:48:52.218173 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:48:52.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.220054 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:48:52.266016 kernel: raid6: avx2x4 gen() 29881 MB/s Dec 13 01:48:52.283002 kernel: raid6: avx2x4 xor() 7166 MB/s Dec 13 01:48:52.299986 kernel: raid6: avx2x2 gen() 31826 MB/s Dec 13 01:48:52.316993 kernel: raid6: avx2x2 xor() 19210 MB/s Dec 13 01:48:52.333988 kernel: raid6: avx2x1 gen() 25584 MB/s Dec 13 01:48:52.350989 kernel: raid6: avx2x1 xor() 15322 MB/s Dec 13 01:48:52.367990 kernel: raid6: sse2x4 gen() 14727 MB/s Dec 13 01:48:52.384989 kernel: raid6: sse2x4 xor() 7157 MB/s Dec 13 01:48:52.401986 kernel: raid6: sse2x2 gen() 16176 MB/s Dec 13 01:48:52.418995 kernel: raid6: sse2x2 xor() 9795 MB/s Dec 13 01:48:52.435997 kernel: raid6: sse2x1 gen() 12339 MB/s Dec 13 01:48:52.453382 kernel: raid6: sse2x1 xor() 7767 MB/s Dec 13 01:48:52.453400 kernel: raid6: using algorithm avx2x2 gen() 31826 MB/s Dec 13 01:48:52.453410 kernel: raid6: .... xor() 19210 MB/s, rmw enabled Dec 13 01:48:52.454099 kernel: raid6: using avx2x2 recovery algorithm Dec 13 01:48:52.467002 kernel: xor: automatically using best checksumming function avx Dec 13 01:48:52.560046 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:48:52.568846 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:48:52.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.569000 audit: BPF prog-id=7 op=LOAD Dec 13 01:48:52.569000 audit: BPF prog-id=8 op=LOAD Dec 13 01:48:52.571033 systemd[1]: Starting systemd-udevd.service... Dec 13 01:48:52.583515 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 01:48:52.587438 systemd[1]: Started systemd-udevd.service. Dec 13 01:48:52.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.589175 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:48:52.599532 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Dec 13 01:48:52.625909 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:48:52.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.628445 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:48:52.664079 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:48:52.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.704804 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:48:52.704849 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 01:48:52.726333 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 01:48:52.726348 kernel: GPT:9289727 != 19775487 Dec 13 01:48:52.726357 kernel: libata version 3.00 loaded. Dec 13 01:48:52.726371 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 01:48:52.726381 kernel: GPT:9289727 != 19775487 Dec 13 01:48:52.726389 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 01:48:52.726398 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:48:52.726407 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 01:48:52.752906 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 01:48:52.752921 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 01:48:52.753043 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:48:52.753054 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 01:48:52.753140 kernel: AES CTR mode by8 optimization enabled Dec 13 01:48:52.753150 kernel: scsi host0: ahci Dec 13 01:48:52.753245 kernel: scsi host1: ahci Dec 13 01:48:52.753344 kernel: scsi host2: ahci Dec 13 01:48:52.753432 kernel: scsi host3: ahci Dec 13 01:48:52.753518 kernel: scsi host4: ahci Dec 13 01:48:52.753607 kernel: scsi host5: ahci Dec 13 01:48:52.753695 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 01:48:52.753705 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 01:48:52.753714 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 01:48:52.753723 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 01:48:52.753732 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (457) Dec 13 01:48:52.753741 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 01:48:52.753751 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 01:48:52.739204 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:48:52.740525 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:48:52.752193 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:48:52.756661 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:48:52.764325 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:48:52.766124 systemd[1]: Starting disk-uuid.service... Dec 13 01:48:52.772813 disk-uuid[528]: Primary Header is updated. Dec 13 01:48:52.772813 disk-uuid[528]: Secondary Entries is updated. Dec 13 01:48:52.772813 disk-uuid[528]: Secondary Header is updated. Dec 13 01:48:52.776577 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:48:52.778993 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:48:53.063011 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 01:48:53.063106 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 01:48:53.063996 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 01:48:53.067209 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 01:48:53.067275 kernel: ata3.00: applying bridge limits Dec 13 01:48:53.067286 kernel: ata3.00: configured for UDMA/100 Dec 13 01:48:53.068020 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 01:48:53.073992 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 01:48:53.074018 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 01:48:53.074998 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 01:48:53.108096 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 01:48:53.125899 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:48:53.125917 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 01:48:53.780013 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:48:53.780078 disk-uuid[529]: The operation has completed successfully. Dec 13 01:48:53.801219 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:48:53.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.801306 systemd[1]: Finished disk-uuid.service. Dec 13 01:48:53.808407 systemd[1]: Starting verity-setup.service... Dec 13 01:48:53.819993 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 01:48:53.839433 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:48:53.841652 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:48:53.843678 systemd[1]: Finished verity-setup.service. Dec 13 01:48:53.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.904846 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:48:53.906193 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:48:53.905030 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:48:53.906250 systemd[1]: Starting ignition-setup.service... Dec 13 01:48:53.907025 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:48:53.919119 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:48:53.919175 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:48:53.919189 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:48:53.927500 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:48:53.936204 systemd[1]: Finished ignition-setup.service. Dec 13 01:48:53.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.937009 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:48:53.974458 ignition[640]: Ignition 2.14.0 Dec 13 01:48:53.974470 ignition[640]: Stage: fetch-offline Dec 13 01:48:53.974554 ignition[640]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:48:53.974564 ignition[640]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:48:53.974676 ignition[640]: parsed url from cmdline: "" Dec 13 01:48:53.974680 ignition[640]: no config URL provided Dec 13 01:48:53.974685 ignition[640]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:48:53.974692 ignition[640]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:48:53.974709 ignition[640]: op(1): [started] loading QEMU firmware config module Dec 13 01:48:53.974713 ignition[640]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 01:48:53.984682 ignition[640]: op(1): [finished] loading QEMU firmware config module Dec 13 01:48:53.984707 ignition[640]: QEMU firmware config was not found. Ignoring... Dec 13 01:48:53.987172 ignition[640]: parsing config with SHA512: 31af9c44597c41e4f127c3b01e8a1894508cfb0ad8f7b30f4c22d3d770a0393c633a871b5fec46ae912e946c59672f1871cc9bc7f41a045a78ba5858aed71df2 Dec 13 01:48:53.989530 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:48:53.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.991000 audit: BPF prog-id=9 op=LOAD Dec 13 01:48:53.993045 systemd[1]: Starting systemd-networkd.service... Dec 13 01:48:53.995837 unknown[640]: fetched base config from "system" Dec 13 01:48:53.996058 unknown[640]: fetched user config from "qemu" Dec 13 01:48:53.996469 ignition[640]: fetch-offline: fetch-offline passed Dec 13 01:48:53.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.997765 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:48:53.996543 ignition[640]: Ignition finished successfully Dec 13 01:48:54.014272 systemd-networkd[721]: lo: Link UP Dec 13 01:48:54.014285 systemd-networkd[721]: lo: Gained carrier Dec 13 01:48:54.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.014716 systemd-networkd[721]: Enumeration completed Dec 13 01:48:54.014805 systemd[1]: Started systemd-networkd.service. Dec 13 01:48:54.014927 systemd-networkd[721]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:48:54.016131 systemd-networkd[721]: eth0: Link UP Dec 13 01:48:54.016135 systemd-networkd[721]: eth0: Gained carrier Dec 13 01:48:54.016353 systemd[1]: Reached target network.target. Dec 13 01:48:54.017837 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 01:48:54.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.027745 ignition[723]: Ignition 2.14.0 Dec 13 01:48:54.018665 systemd[1]: Starting ignition-kargs.service... Dec 13 01:48:54.027750 ignition[723]: Stage: kargs Dec 13 01:48:54.030723 iscsid[732]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:48:54.030723 iscsid[732]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 01:48:54.030723 iscsid[732]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:48:54.030723 iscsid[732]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:48:54.030723 iscsid[732]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:48:54.030723 iscsid[732]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:48:54.030723 iscsid[732]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:48:54.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.020151 systemd[1]: Starting iscsiuio.service... Dec 13 01:48:54.027842 ignition[723]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:48:54.024670 systemd[1]: Started iscsiuio.service. Dec 13 01:48:54.027851 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:48:54.027037 systemd[1]: Starting iscsid.service... Dec 13 01:48:54.029649 ignition[723]: kargs: kargs passed Dec 13 01:48:54.030813 systemd[1]: Finished ignition-kargs.service. Dec 13 01:48:54.029689 ignition[723]: Ignition finished successfully Dec 13 01:48:54.032369 systemd[1]: Starting ignition-disks.service... Dec 13 01:48:54.039633 ignition[733]: Ignition 2.14.0 Dec 13 01:48:54.033115 systemd[1]: Started iscsid.service. Dec 13 01:48:54.039641 ignition[733]: Stage: disks Dec 13 01:48:54.033853 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:48:54.039821 ignition[733]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:48:54.035076 systemd-networkd[721]: eth0: DHCPv4 address 10.0.0.28/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:48:54.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.039831 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:48:54.041721 systemd[1]: Finished ignition-disks.service. Dec 13 01:48:54.040653 ignition[733]: disks: disks passed Dec 13 01:48:54.045391 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:48:54.040691 ignition[733]: Ignition finished successfully Dec 13 01:48:54.047395 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:48:54.049022 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:48:54.050782 systemd[1]: Reached target local-fs.target. Dec 13 01:48:54.051580 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:48:54.053073 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:48:54.053961 systemd[1]: Reached target remote-fs.target. Dec 13 01:48:54.055815 systemd[1]: Reached target sysinit.target. Dec 13 01:48:54.056601 systemd[1]: Reached target basic.target. Dec 13 01:48:54.058255 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:48:54.065702 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:48:54.082626 systemd-fsck[754]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 01:48:54.067847 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:48:54.087416 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:48:54.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.089043 systemd[1]: Mounting sysroot.mount... Dec 13 01:48:54.098005 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:48:54.098149 systemd[1]: Mounted sysroot.mount. Dec 13 01:48:54.098945 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:48:54.101324 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:48:54.101682 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 01:48:54.101713 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:48:54.101730 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:48:54.103841 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:48:54.106210 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:48:54.110765 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:48:54.116695 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:48:54.120724 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:48:54.123828 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:48:54.150119 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:48:54.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.151834 systemd[1]: Starting ignition-mount.service... Dec 13 01:48:54.153169 systemd[1]: Starting sysroot-boot.service... Dec 13 01:48:54.157121 bash[805]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 01:48:54.165202 ignition[807]: INFO : Ignition 2.14.0 Dec 13 01:48:54.166168 ignition[807]: INFO : Stage: mount Dec 13 01:48:54.166168 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:48:54.166168 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:48:54.169018 ignition[807]: INFO : mount: mount passed Dec 13 01:48:54.169018 ignition[807]: INFO : Ignition finished successfully Dec 13 01:48:54.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.168347 systemd[1]: Finished ignition-mount.service. Dec 13 01:48:54.174847 systemd[1]: Finished sysroot-boot.service. Dec 13 01:48:54.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.852751 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:48:54.859998 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) Dec 13 01:48:54.860022 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:48:54.862661 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:48:54.862674 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:48:54.865677 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:48:54.866462 systemd[1]: Starting ignition-files.service... Dec 13 01:48:54.879907 ignition[835]: INFO : Ignition 2.14.0 Dec 13 01:48:54.879907 ignition[835]: INFO : Stage: files Dec 13 01:48:54.881466 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:48:54.881466 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:48:54.884272 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:48:54.886053 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:48:54.886053 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:48:54.889245 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:48:54.890723 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:48:54.892394 unknown[835]: wrote ssh authorized keys file for user: core Dec 13 01:48:54.893428 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:48:54.895037 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:48:54.896940 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:48:54.898743 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:48:54.898743 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:48:54.898743 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:48:54.904532 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:48:54.906944 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:48:54.909048 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 01:48:55.270252 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 01:48:55.344150 systemd-networkd[721]: eth0: Gained IPv6LL Dec 13 01:48:55.660474 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:48:55.660474 ignition[835]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 01:48:55.664337 ignition[835]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:48:55.664337 ignition[835]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:48:55.664337 ignition[835]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 01:48:55.664337 ignition[835]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 01:48:55.664337 ignition[835]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:48:55.690737 ignition[835]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:48:55.692355 ignition[835]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 01:48:55.693879 ignition[835]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:48:55.695608 ignition[835]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:48:55.697278 ignition[835]: INFO : files: files passed Dec 13 01:48:55.697278 ignition[835]: INFO : Ignition finished successfully Dec 13 01:48:55.698566 systemd[1]: Finished ignition-files.service. Dec 13 01:48:55.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.700767 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:48:55.700897 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:48:55.701541 systemd[1]: Starting ignition-quench.service... Dec 13 01:48:55.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.704411 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:48:55.704486 systemd[1]: Finished ignition-quench.service. Dec 13 01:48:55.712434 initrd-setup-root-after-ignition[861]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 01:48:55.715437 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:48:55.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.716129 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:48:55.718248 systemd[1]: Reached target ignition-complete.target. Dec 13 01:48:55.719822 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:48:55.731866 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:48:55.731956 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:48:55.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.733796 systemd[1]: Reached target initrd-fs.target. Dec 13 01:48:55.735293 systemd[1]: Reached target initrd.target. Dec 13 01:48:55.736091 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:48:55.736758 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:48:55.750281 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:48:55.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.752893 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:48:55.761330 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:48:55.762265 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:48:55.763892 systemd[1]: Stopped target timers.target. Dec 13 01:48:55.765531 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:48:55.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.765628 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:48:55.767184 systemd[1]: Stopped target initrd.target. Dec 13 01:48:55.768803 systemd[1]: Stopped target basic.target. Dec 13 01:48:55.770337 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:48:55.771953 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:48:55.773540 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:48:55.775318 systemd[1]: Stopped target remote-fs.target. Dec 13 01:48:55.776979 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:48:55.778665 systemd[1]: Stopped target sysinit.target. Dec 13 01:48:55.780220 systemd[1]: Stopped target local-fs.target. Dec 13 01:48:55.781812 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:48:55.783389 systemd[1]: Stopped target swap.target. Dec 13 01:48:55.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.784852 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:48:55.784940 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:48:55.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.786537 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:48:55.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.787999 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:48:55.788085 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:48:55.789840 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:48:55.789931 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:48:55.791512 systemd[1]: Stopped target paths.target. Dec 13 01:48:55.792998 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:48:55.798046 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:48:55.799617 systemd[1]: Stopped target slices.target. Dec 13 01:48:55.801172 systemd[1]: Stopped target sockets.target. Dec 13 01:48:55.802682 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:48:55.802756 systemd[1]: Closed iscsid.socket. Dec 13 01:48:55.804133 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:48:55.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.804201 systemd[1]: Closed iscsiuio.socket. Dec 13 01:48:55.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.805710 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:48:55.805810 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:48:55.807324 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:48:55.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.807412 systemd[1]: Stopped ignition-files.service. Dec 13 01:48:55.809768 systemd[1]: Stopping ignition-mount.service... Dec 13 01:48:55.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.820148 ignition[876]: INFO : Ignition 2.14.0 Dec 13 01:48:55.820148 ignition[876]: INFO : Stage: umount Dec 13 01:48:55.820148 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:48:55.820148 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:48:55.820148 ignition[876]: INFO : umount: umount passed Dec 13 01:48:55.820148 ignition[876]: INFO : Ignition finished successfully Dec 13 01:48:55.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.811509 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:48:55.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.811609 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:48:55.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.814110 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:48:55.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.814999 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:48:55.815309 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:48:55.816803 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:48:55.816961 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:48:55.820799 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:48:55.820887 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:48:55.821350 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:48:55.821426 systemd[1]: Stopped ignition-mount.service. Dec 13 01:48:55.824881 systemd[1]: Stopped target network.target. Dec 13 01:48:55.826799 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:48:55.826839 systemd[1]: Stopped ignition-disks.service. Dec 13 01:48:55.828479 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:48:55.828512 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:48:55.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.830200 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:48:55.830236 systemd[1]: Stopped ignition-setup.service. Dec 13 01:48:55.831793 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:48:55.833305 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:48:55.843721 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:48:55.843808 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:48:55.858044 systemd-networkd[721]: eth0: DHCPv6 lease lost Dec 13 01:48:55.858346 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:48:55.859000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:48:55.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.859350 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:48:55.859452 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:48:55.864491 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:48:55.864527 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:48:55.867107 systemd[1]: Stopping network-cleanup.service... Dec 13 01:48:55.867906 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:48:55.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.869000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:48:55.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.867956 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:48:55.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.869692 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:48:55.869727 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:48:55.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.871742 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:48:55.871777 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:48:55.871933 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:48:55.873079 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:48:55.875819 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:48:55.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.875940 systemd[1]: Stopped network-cleanup.service. Dec 13 01:48:55.881612 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:48:55.881730 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:48:55.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.885206 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:48:55.885241 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:48:55.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.887168 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:48:55.887195 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:48:55.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.889327 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:48:55.889363 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:48:55.891097 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:48:55.891130 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:48:55.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.892996 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:48:55.893028 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:48:55.895398 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:48:55.896564 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:48:55.896605 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:48:55.900832 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:48:55.900908 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:48:55.919045 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:48:55.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.919133 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:48:55.919290 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:48:55.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:55.921615 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:48:55.921653 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:48:55.924355 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:48:55.946201 systemd[1]: Switching root. Dec 13 01:48:55.964990 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). Dec 13 01:48:55.965071 iscsid[732]: iscsid shutting down. Dec 13 01:48:55.965993 systemd-journald[198]: Journal stopped Dec 13 01:48:59.125352 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:48:59.125431 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:48:59.125447 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:48:59.125463 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:48:59.125480 kernel: SELinux: policy capability open_perms=1 Dec 13 01:48:59.125495 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:48:59.125511 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:48:59.125526 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:48:59.125538 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:48:59.125551 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:48:59.125563 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:48:59.125587 systemd[1]: Successfully loaded SELinux policy in 39.435ms. Dec 13 01:48:59.125620 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.993ms. Dec 13 01:48:59.125636 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:48:59.125655 systemd[1]: Detected virtualization kvm. Dec 13 01:48:59.125670 systemd[1]: Detected architecture x86-64. Dec 13 01:48:59.125684 systemd[1]: Detected first boot. Dec 13 01:48:59.125701 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:48:59.125714 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 01:48:59.125734 kernel: audit: type=1400 audit(1734054536.226:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:48:59.125756 kernel: audit: type=1400 audit(1734054536.226:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:48:59.125773 kernel: audit: type=1334 audit(1734054536.230:78): prog-id=10 op=LOAD Dec 13 01:48:59.125786 kernel: audit: type=1334 audit(1734054536.230:79): prog-id=10 op=UNLOAD Dec 13 01:48:59.125800 kernel: audit: type=1334 audit(1734054536.234:80): prog-id=11 op=LOAD Dec 13 01:48:59.125814 kernel: audit: type=1334 audit(1734054536.234:81): prog-id=11 op=UNLOAD Dec 13 01:48:59.125827 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:48:59.125842 kernel: audit: type=1400 audit(1734054536.267:82): avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:48:59.125867 kernel: audit: type=1300 audit(1734054536.267:82): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:59.125883 kernel: audit: type=1327 audit(1734054536.267:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:48:59.125900 kernel: audit: type=1400 audit(1734054536.269:83): avc: denied { associate } for pid=910 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:48:59.125915 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:48:59.125931 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:48:59.125946 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:48:59.125985 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:48:59.126003 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:48:59.126022 systemd[1]: Stopped iscsiuio.service. Dec 13 01:48:59.126037 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:48:59.126050 systemd[1]: Stopped iscsid.service. Dec 13 01:48:59.126067 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:48:59.126081 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:48:59.126095 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:48:59.126110 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:48:59.126129 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:48:59.126143 systemd[1]: Created slice system-getty.slice. Dec 13 01:48:59.126162 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:48:59.126177 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:48:59.126191 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:48:59.126214 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:48:59.126228 systemd[1]: Created slice user.slice. Dec 13 01:48:59.126242 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:48:59.126256 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:48:59.126272 systemd[1]: Set up automount boot.automount. Dec 13 01:48:59.126287 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:48:59.126300 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:48:59.126314 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:48:59.126329 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:48:59.126346 systemd[1]: Reached target integritysetup.target. Dec 13 01:48:59.126362 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:48:59.126376 systemd[1]: Reached target remote-fs.target. Dec 13 01:48:59.126393 systemd[1]: Reached target slices.target. Dec 13 01:48:59.126408 systemd[1]: Reached target swap.target. Dec 13 01:48:59.126422 systemd[1]: Reached target torcx.target. Dec 13 01:48:59.126436 systemd[1]: Reached target veritysetup.target. Dec 13 01:48:59.126451 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:48:59.126466 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:48:59.126481 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:48:59.126499 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:48:59.126514 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:48:59.126528 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:48:59.126543 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:48:59.126558 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:48:59.126573 systemd[1]: Mounting media.mount... Dec 13 01:48:59.126587 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:48:59.126602 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:48:59.126616 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:48:59.126633 systemd[1]: Mounting tmp.mount... Dec 13 01:48:59.126647 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:48:59.126661 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:48:59.126677 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:48:59.126691 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:48:59.126708 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:48:59.126722 systemd[1]: Starting modprobe@drm.service... Dec 13 01:48:59.126737 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:48:59.126750 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:48:59.126760 systemd[1]: Starting modprobe@loop.service... Dec 13 01:48:59.126774 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:48:59.126785 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:48:59.126795 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:48:59.126805 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:48:59.126815 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:48:59.126825 kernel: loop: module loaded Dec 13 01:48:59.126835 systemd[1]: Stopped systemd-journald.service. Dec 13 01:48:59.126845 systemd[1]: Starting systemd-journald.service... Dec 13 01:48:59.126868 kernel: fuse: init (API version 7.34) Dec 13 01:48:59.126879 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:48:59.126889 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:48:59.126900 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:48:59.126910 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:48:59.126921 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:48:59.126931 systemd[1]: Stopped verity-setup.service. Dec 13 01:48:59.126943 systemd-journald[995]: Journal started Dec 13 01:48:59.127012 systemd-journald[995]: Runtime Journal (/run/log/journal/c72de6de51724db8920e85fbdd2efdd6) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:48:56.025000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:48:56.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:48:56.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:48:56.230000 audit: BPF prog-id=10 op=LOAD Dec 13 01:48:56.230000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:48:56.234000 audit: BPF prog-id=11 op=LOAD Dec 13 01:48:56.234000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:48:56.267000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:48:56.267000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:56.267000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:48:56.269000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:48:56.269000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:56.269000 audit: CWD cwd="/" Dec 13 01:48:56.269000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:56.269000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:56.269000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:48:58.989000 audit: BPF prog-id=12 op=LOAD Dec 13 01:48:58.989000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:48:58.989000 audit: BPF prog-id=13 op=LOAD Dec 13 01:48:58.989000 audit: BPF prog-id=14 op=LOAD Dec 13 01:48:58.989000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:48:58.989000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:48:58.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:58.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:58.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.002000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:48:59.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.105000 audit: BPF prog-id=15 op=LOAD Dec 13 01:48:59.105000 audit: BPF prog-id=16 op=LOAD Dec 13 01:48:59.105000 audit: BPF prog-id=17 op=LOAD Dec 13 01:48:59.105000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:48:59.105000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:48:59.123000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:48:59.123000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcfa2bccc0 a2=4000 a3=7ffcfa2bcd5c items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:59.123000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:48:56.266724 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:48:58.987949 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:48:59.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:56.266987 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:48:58.987959 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 01:48:56.267005 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:48:58.991517 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:48:56.267036 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:48:56.267047 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:48:56.267077 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:48:56.267090 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:48:56.267273 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:48:56.267310 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:48:56.267322 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:48:56.268060 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:48:56.268100 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:48:56.268121 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:48:56.268134 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:48:56.268153 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:48:56.268165 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:48:58.715258 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:48:58.715670 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:48:58.715823 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:48:58.716026 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:48:58.716075 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:48:58.716162 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:48:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:48:59.131013 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:48:59.133175 systemd[1]: Started systemd-journald.service. Dec 13 01:48:59.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.133721 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:48:59.134639 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:48:59.135502 systemd[1]: Mounted media.mount. Dec 13 01:48:59.136303 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:48:59.137229 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:48:59.138196 systemd[1]: Mounted tmp.mount. Dec 13 01:48:59.139141 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:48:59.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.140291 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:48:59.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.141409 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:48:59.141575 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:48:59.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.142692 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:48:59.142838 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:48:59.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.143929 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:48:59.144065 systemd[1]: Finished modprobe@drm.service. Dec 13 01:48:59.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.145206 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:48:59.145332 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:48:59.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.146509 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:48:59.146681 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:48:59.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.147721 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:48:59.147883 systemd[1]: Finished modprobe@loop.service. Dec 13 01:48:59.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.149018 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:48:59.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.150186 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:48:59.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.151508 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:48:59.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.152772 systemd[1]: Reached target network-pre.target. Dec 13 01:48:59.154692 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:48:59.156495 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:48:59.157607 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:48:59.158770 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:48:59.160608 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:48:59.161594 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:48:59.162362 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:48:59.163348 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:48:59.164259 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:48:59.166796 systemd-journald[995]: Time spent on flushing to /var/log/journal/c72de6de51724db8920e85fbdd2efdd6 is 21.745ms for 1140 entries. Dec 13 01:48:59.166796 systemd-journald[995]: System Journal (/var/log/journal/c72de6de51724db8920e85fbdd2efdd6) is 8.0M, max 195.6M, 187.6M free. Dec 13 01:48:59.206484 systemd-journald[995]: Received client request to flush runtime journal. Dec 13 01:48:59.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.166458 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:48:59.170752 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:48:59.171816 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:48:59.211017 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 01:48:59.178268 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:48:59.179622 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:48:59.185715 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:48:59.186934 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:48:59.198062 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:48:59.200076 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:48:59.209287 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:48:59.745165 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:48:59.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.745000 audit: BPF prog-id=18 op=LOAD Dec 13 01:48:59.745000 audit: BPF prog-id=19 op=LOAD Dec 13 01:48:59.745000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:48:59.745000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:48:59.747620 systemd[1]: Starting systemd-udevd.service... Dec 13 01:48:59.763179 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Dec 13 01:48:59.776069 systemd[1]: Started systemd-udevd.service. Dec 13 01:48:59.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.777000 audit: BPF prog-id=20 op=LOAD Dec 13 01:48:59.779658 systemd[1]: Starting systemd-networkd.service... Dec 13 01:48:59.789000 audit: BPF prog-id=21 op=LOAD Dec 13 01:48:59.790991 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:48:59.789000 audit: BPF prog-id=22 op=LOAD Dec 13 01:48:59.789000 audit: BPF prog-id=23 op=LOAD Dec 13 01:48:59.807241 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:48:59.832426 systemd[1]: Started systemd-userdbd.service. Dec 13 01:48:59.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.844237 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:48:59.851004 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 01:48:59.855015 kernel: ACPI: button: Power Button [PWRF] Dec 13 01:48:59.862000 audit[1034]: AVC avc: denied { confidentiality } for pid=1034 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:48:59.862000 audit[1034]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557307ccea50 a1=337fc a2=7fc54947dbc5 a3=5 items=110 ppid=1016 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:59.862000 audit: CWD cwd="/" Dec 13 01:48:59.862000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=1 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=2 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=3 name=(null) inode=969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=4 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=5 name=(null) inode=970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=6 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=7 name=(null) inode=971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=8 name=(null) inode=971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=9 name=(null) inode=972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=10 name=(null) inode=971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=11 name=(null) inode=973 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=12 name=(null) inode=971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=13 name=(null) inode=974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=14 name=(null) inode=971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=15 name=(null) inode=975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=16 name=(null) inode=971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=17 name=(null) inode=976 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=18 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=19 name=(null) inode=977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=20 name=(null) inode=977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=21 name=(null) inode=978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=22 name=(null) inode=977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=23 name=(null) inode=979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=24 name=(null) inode=977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=25 name=(null) inode=980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=26 name=(null) inode=977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=27 name=(null) inode=981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=28 name=(null) inode=977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=29 name=(null) inode=982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=30 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=31 name=(null) inode=983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=32 name=(null) inode=983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=33 name=(null) inode=984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=34 name=(null) inode=983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=35 name=(null) inode=985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=36 name=(null) inode=983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=37 name=(null) inode=986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=38 name=(null) inode=983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=39 name=(null) inode=987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=40 name=(null) inode=983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=41 name=(null) inode=988 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=42 name=(null) inode=968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=43 name=(null) inode=989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=44 name=(null) inode=989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=45 name=(null) inode=990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=46 name=(null) inode=989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=47 name=(null) inode=991 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=48 name=(null) inode=989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=49 name=(null) inode=992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=50 name=(null) inode=989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=51 name=(null) inode=993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=52 name=(null) inode=989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=53 name=(null) inode=994 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=55 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=56 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=57 name=(null) inode=996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=58 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=59 name=(null) inode=997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=60 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=61 name=(null) inode=998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=62 name=(null) inode=998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=63 name=(null) inode=999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=64 name=(null) inode=998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=65 name=(null) inode=1000 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=66 name=(null) inode=998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=67 name=(null) inode=1001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=68 name=(null) inode=998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=69 name=(null) inode=1002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=70 name=(null) inode=998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=71 name=(null) inode=1003 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=72 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=73 name=(null) inode=1004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=74 name=(null) inode=1004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=75 name=(null) inode=1005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=76 name=(null) inode=1004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=77 name=(null) inode=1006 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=78 name=(null) inode=1004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=79 name=(null) inode=1007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=80 name=(null) inode=1004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=81 name=(null) inode=1008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=82 name=(null) inode=1004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=83 name=(null) inode=1009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=84 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=85 name=(null) inode=1010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=86 name=(null) inode=1010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=87 name=(null) inode=1011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=88 name=(null) inode=1010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=89 name=(null) inode=1012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=90 name=(null) inode=1010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=91 name=(null) inode=1013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=92 name=(null) inode=1010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=93 name=(null) inode=1014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=94 name=(null) inode=1010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=95 name=(null) inode=1015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.883227 systemd-networkd[1028]: lo: Link UP Dec 13 01:48:59.883237 systemd-networkd[1028]: lo: Gained carrier Dec 13 01:48:59.862000 audit: PATH item=96 name=(null) inode=995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=97 name=(null) inode=1016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.883605 systemd-networkd[1028]: Enumeration completed Dec 13 01:48:59.883699 systemd-networkd[1028]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:48:59.883710 systemd[1]: Started systemd-networkd.service. Dec 13 01:48:59.862000 audit: PATH item=98 name=(null) inode=1016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=99 name=(null) inode=1017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=100 name=(null) inode=1016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=101 name=(null) inode=1018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=102 name=(null) inode=1016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=103 name=(null) inode=1019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=104 name=(null) inode=1016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:59.884922 systemd-networkd[1028]: eth0: Link UP Dec 13 01:48:59.884925 systemd-networkd[1028]: eth0: Gained carrier Dec 13 01:48:59.862000 audit: PATH item=105 name=(null) inode=1020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=106 name=(null) inode=1016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=107 name=(null) inode=1021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PATH item=109 name=(null) inode=1022 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:48:59.862000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:48:59.896342 systemd-networkd[1028]: eth0: DHCPv4 address 10.0.0.28/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:48:59.897993 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 01:48:59.907226 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 01:48:59.907261 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 01:48:59.907426 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 01:48:59.907626 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 01:48:59.909998 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:49:00.014414 kernel: kvm: Nested Virtualization enabled Dec 13 01:49:00.014536 kernel: SVM: kvm: Nested Paging enabled Dec 13 01:49:00.014569 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 01:49:00.014588 kernel: SVM: Virtual GIF supported Dec 13 01:49:00.029000 kernel: EDAC MC: Ver: 3.0.0 Dec 13 01:49:00.055287 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:49:00.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.057306 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:49:00.064659 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:49:00.092626 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:49:00.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.093623 systemd[1]: Reached target cryptsetup.target. Dec 13 01:49:00.095376 systemd[1]: Starting lvm2-activation.service... Dec 13 01:49:00.098516 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:49:00.122615 systemd[1]: Finished lvm2-activation.service. Dec 13 01:49:00.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.123546 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:49:00.124413 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:49:00.124437 systemd[1]: Reached target local-fs.target. Dec 13 01:49:00.125232 systemd[1]: Reached target machines.target. Dec 13 01:49:00.126932 systemd[1]: Starting ldconfig.service... Dec 13 01:49:00.127835 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.127873 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:00.128608 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:49:00.130281 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:49:00.132200 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:49:00.133939 systemd[1]: Starting systemd-sysext.service... Dec 13 01:49:00.137021 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1055 (bootctl) Dec 13 01:49:00.137905 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:49:00.141113 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:49:00.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.143933 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:49:00.147819 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:49:00.147958 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:49:00.156990 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 01:49:00.172488 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) Dec 13 01:49:00.172488 systemd-fsck[1063]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 01:49:00.173764 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:49:00.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.176928 systemd[1]: Mounting boot.mount... Dec 13 01:49:00.346009 systemd[1]: Mounted boot.mount. Dec 13 01:49:00.351008 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:49:00.358780 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:49:00.359339 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:49:00.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.360831 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:49:00.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.366995 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 01:49:00.370678 (sd-sysext)[1068]: Using extensions 'kubernetes'. Dec 13 01:49:00.371099 (sd-sysext)[1068]: Merged extensions into '/usr'. Dec 13 01:49:00.385463 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:49:00.386927 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:49:00.387833 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.389192 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:49:00.391631 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:49:00.393591 systemd[1]: Starting modprobe@loop.service... Dec 13 01:49:00.394696 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.394880 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:00.395042 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:49:00.397729 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:49:00.398901 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:49:00.399041 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:49:00.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.400346 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:49:00.400445 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:49:00.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.402015 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:49:00.402148 systemd[1]: Finished modprobe@loop.service. Dec 13 01:49:00.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.403386 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:49:00.403477 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.404796 systemd[1]: Finished systemd-sysext.service. Dec 13 01:49:00.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.406842 systemd[1]: Starting ensure-sysext.service... Dec 13 01:49:00.408638 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:49:00.414649 systemd[1]: Reloading. Dec 13 01:49:00.425228 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:49:00.429755 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:49:00.433379 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:49:00.447994 ldconfig[1054]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:49:00.461226 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2024-12-13T01:49:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:49:00.461252 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2024-12-13T01:49:00Z" level=info msg="torcx already run" Dec 13 01:49:00.570913 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:49:00.570938 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:49:00.596503 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:49:00.671000 audit: BPF prog-id=24 op=LOAD Dec 13 01:49:00.671000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:49:00.671000 audit: BPF prog-id=25 op=LOAD Dec 13 01:49:00.671000 audit: BPF prog-id=26 op=LOAD Dec 13 01:49:00.671000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:49:00.671000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:49:00.672000 audit: BPF prog-id=27 op=LOAD Dec 13 01:49:00.672000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:49:00.672000 audit: BPF prog-id=28 op=LOAD Dec 13 01:49:00.672000 audit: BPF prog-id=29 op=LOAD Dec 13 01:49:00.672000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:49:00.672000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:49:00.673000 audit: BPF prog-id=30 op=LOAD Dec 13 01:49:00.673000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:49:00.676000 audit: BPF prog-id=31 op=LOAD Dec 13 01:49:00.676000 audit: BPF prog-id=32 op=LOAD Dec 13 01:49:00.676000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:49:00.676000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:49:00.679870 systemd[1]: Finished ldconfig.service. Dec 13 01:49:00.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.681051 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:49:00.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.685865 systemd[1]: Starting audit-rules.service... Dec 13 01:49:00.687612 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:49:00.689652 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:49:00.690000 audit: BPF prog-id=33 op=LOAD Dec 13 01:49:00.692000 audit: BPF prog-id=34 op=LOAD Dec 13 01:49:00.692201 systemd[1]: Starting systemd-resolved.service... Dec 13 01:49:00.694416 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:49:00.696239 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:49:00.697738 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:49:00.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.700691 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:49:00.705152 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.704000 audit[1144]: SYSTEM_BOOT pid=1144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.706644 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:49:00.708667 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:49:00.710746 systemd[1]: Starting modprobe@loop.service... Dec 13 01:49:00.711625 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.711775 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:00.711938 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:49:00.713436 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:49:00.713626 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:49:00.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.715960 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:49:00.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.717829 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:49:00.718008 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:49:00.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.719703 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:49:00.719854 systemd[1]: Finished modprobe@loop.service. Dec 13 01:49:00.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.727314 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.730112 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:49:00.733179 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:49:00.735649 systemd[1]: Starting modprobe@loop.service... Dec 13 01:49:00.736821 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.737070 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:00.739216 systemd[1]: Starting systemd-update-done.service... Dec 13 01:49:00.740482 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:49:00.742485 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:49:00.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.744540 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:49:00.744763 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:49:00.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.746494 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:49:00.746704 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:49:00.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.748798 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:49:00.748997 systemd[1]: Finished modprobe@loop.service. Dec 13 01:49:00.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.751222 systemd[1]: Finished systemd-update-done.service. Dec 13 01:49:00.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:00.753943 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:49:00.754282 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.755000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:49:00.755000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff5637a3f0 a2=420 a3=0 items=0 ppid=1138 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:00.755000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:49:00.756955 augenrules[1165]: No rules Dec 13 01:49:00.757368 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:49:00.759594 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:49:00.762358 systemd[1]: Starting modprobe@drm.service... Dec 13 01:49:00.764903 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:49:01.263369 systemd-timesyncd[1143]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 01:49:01.263468 systemd-timesyncd[1143]: Initial clock synchronization to Fri 2024-12-13 01:49:01.263279 UTC. Dec 13 01:49:01.263949 systemd[1]: Starting modprobe@loop.service... Dec 13 01:49:01.265263 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:49:01.265417 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:01.267354 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:49:01.268654 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:49:01.269781 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:49:01.271847 systemd[1]: Finished audit-rules.service. Dec 13 01:49:01.273042 systemd-resolved[1141]: Positive Trust Anchors: Dec 13 01:49:01.273058 systemd-resolved[1141]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:49:01.273084 systemd-resolved[1141]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:49:01.273387 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:49:01.273534 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:49:01.275295 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:49:01.275437 systemd[1]: Finished modprobe@drm.service. Dec 13 01:49:01.276911 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:49:01.277068 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:49:01.278502 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:49:01.278641 systemd[1]: Finished modprobe@loop.service. Dec 13 01:49:01.282451 systemd[1]: Finished ensure-sysext.service. Dec 13 01:49:01.283701 systemd[1]: Reached target time-set.target. Dec 13 01:49:01.284685 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:49:01.284737 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:49:01.285427 systemd-resolved[1141]: Defaulting to hostname 'linux'. Dec 13 01:49:01.287075 systemd[1]: Started systemd-resolved.service. Dec 13 01:49:01.288075 systemd[1]: Reached target network.target. Dec 13 01:49:01.289009 systemd[1]: Reached target nss-lookup.target. Dec 13 01:49:01.290064 systemd[1]: Reached target sysinit.target. Dec 13 01:49:01.291079 systemd[1]: Started motdgen.path. Dec 13 01:49:01.291819 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:49:01.293142 systemd[1]: Started logrotate.timer. Dec 13 01:49:01.294029 systemd[1]: Started mdadm.timer. Dec 13 01:49:01.294763 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:49:01.295689 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:49:01.295710 systemd[1]: Reached target paths.target. Dec 13 01:49:01.296566 systemd[1]: Reached target timers.target. Dec 13 01:49:01.297799 systemd[1]: Listening on dbus.socket. Dec 13 01:49:01.299864 systemd[1]: Starting docker.socket... Dec 13 01:49:01.303117 systemd[1]: Listening on sshd.socket. Dec 13 01:49:01.304105 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:01.304536 systemd[1]: Listening on docker.socket. Dec 13 01:49:01.305471 systemd[1]: Reached target sockets.target. Dec 13 01:49:01.306400 systemd[1]: Reached target basic.target. Dec 13 01:49:01.307251 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:49:01.307278 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:49:01.308434 systemd[1]: Starting containerd.service... Dec 13 01:49:01.310282 systemd[1]: Starting dbus.service... Dec 13 01:49:01.312124 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:49:01.314160 systemd[1]: Starting extend-filesystems.service... Dec 13 01:49:01.315180 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:49:01.316569 systemd[1]: Starting motdgen.service... Dec 13 01:49:01.318539 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:49:01.324746 jq[1180]: false Dec 13 01:49:01.320754 systemd[1]: Starting sshd-keygen.service... Dec 13 01:49:01.324775 systemd[1]: Starting systemd-logind.service... Dec 13 01:49:01.325746 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:49:01.325839 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:49:01.326293 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:49:01.345501 jq[1193]: true Dec 13 01:49:01.327125 systemd[1]: Starting update-engine.service... Dec 13 01:49:01.329265 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:49:01.345770 jq[1198]: true Dec 13 01:49:01.332127 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:49:01.332361 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:49:01.332748 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:49:01.333647 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:49:01.346717 extend-filesystems[1181]: Found loop1 Dec 13 01:49:01.346717 extend-filesystems[1181]: Found sr0 Dec 13 01:49:01.346717 extend-filesystems[1181]: Found vda Dec 13 01:49:01.346717 extend-filesystems[1181]: Found vda1 Dec 13 01:49:01.346717 extend-filesystems[1181]: Found vda2 Dec 13 01:49:01.358199 extend-filesystems[1181]: Found vda3 Dec 13 01:49:01.358199 extend-filesystems[1181]: Found usr Dec 13 01:49:01.358199 extend-filesystems[1181]: Found vda4 Dec 13 01:49:01.358199 extend-filesystems[1181]: Found vda6 Dec 13 01:49:01.358199 extend-filesystems[1181]: Found vda7 Dec 13 01:49:01.358199 extend-filesystems[1181]: Found vda9 Dec 13 01:49:01.358199 extend-filesystems[1181]: Checking size of /dev/vda9 Dec 13 01:49:01.354690 dbus-daemon[1179]: [system] SELinux support is enabled Dec 13 01:49:01.353270 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:49:01.353498 systemd[1]: Finished motdgen.service. Dec 13 01:49:01.354866 systemd[1]: Started dbus.service. Dec 13 01:49:01.358216 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:49:01.358240 systemd[1]: Reached target system-config.target. Dec 13 01:49:01.360011 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:49:01.360054 systemd[1]: Reached target user-config.target. Dec 13 01:49:01.447376 env[1199]: time="2024-12-13T01:49:01.444635624Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:49:01.454113 extend-filesystems[1181]: Resized partition /dev/vda9 Dec 13 01:49:01.462937 update_engine[1191]: I1213 01:49:01.462714 1191 main.cc:92] Flatcar Update Engine starting Dec 13 01:49:01.467699 update_engine[1191]: I1213 01:49:01.465333 1191 update_check_scheduler.cc:74] Next update check in 3m43s Dec 13 01:49:01.467786 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 01:49:01.465418 systemd[1]: Started update-engine.service. Dec 13 01:49:01.470787 systemd[1]: Started locksmithd.service. Dec 13 01:49:01.476461 bash[1223]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:49:01.480531 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 01:49:01.479014 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:49:01.481624 systemd-logind[1189]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 01:49:01.481650 systemd-logind[1189]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:49:01.481956 systemd-logind[1189]: New seat seat0. Dec 13 01:49:01.485677 systemd[1]: Started systemd-logind.service. Dec 13 01:49:01.500019 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 01:49:01.507770 env[1199]: time="2024-12-13T01:49:01.507710895Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:49:01.525405 env[1199]: time="2024-12-13T01:49:01.525364508Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:49:01.525770 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 01:49:01.525770 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 01:49:01.525770 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527509622Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527553534Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527805297Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527831436Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527845672Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527854579Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.527919531Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.528170141Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.528274557Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:49:01.529586 env[1199]: time="2024-12-13T01:49:01.528288994Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:49:01.529852 env[1199]: time="2024-12-13T01:49:01.528333788Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:49:01.529852 env[1199]: time="2024-12-13T01:49:01.528344668Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:49:01.530051 extend-filesystems[1181]: Resized filesystem in /dev/vda9 Dec 13 01:49:01.531631 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:49:01.531810 systemd[1]: Finished extend-filesystems.service. Dec 13 01:49:01.536726 env[1199]: time="2024-12-13T01:49:01.536685894Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:49:01.536726 env[1199]: time="2024-12-13T01:49:01.536718806Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:49:01.536835 env[1199]: time="2024-12-13T01:49:01.536734145Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:49:01.536835 env[1199]: time="2024-12-13T01:49:01.536774610Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536835 env[1199]: time="2024-12-13T01:49:01.536791512Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536835 env[1199]: time="2024-12-13T01:49:01.536804456Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536933 env[1199]: time="2024-12-13T01:49:01.536866884Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536933 env[1199]: time="2024-12-13T01:49:01.536883144Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536933 env[1199]: time="2024-12-13T01:49:01.536894796Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536933 env[1199]: time="2024-12-13T01:49:01.536909954Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.536933 env[1199]: time="2024-12-13T01:49:01.536923430Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.537058 env[1199]: time="2024-12-13T01:49:01.536936514Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:49:01.537058 env[1199]: time="2024-12-13T01:49:01.537044146Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:49:01.537149 env[1199]: time="2024-12-13T01:49:01.537122623Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:49:01.537513 env[1199]: time="2024-12-13T01:49:01.537485043Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:49:01.537541 env[1199]: time="2024-12-13T01:49:01.537524026Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537564 env[1199]: time="2024-12-13T01:49:01.537544264Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:49:01.537645 env[1199]: time="2024-12-13T01:49:01.537626088Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537645 env[1199]: time="2024-12-13T01:49:01.537640054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537694 env[1199]: time="2024-12-13T01:49:01.537653619Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537761 env[1199]: time="2024-12-13T01:49:01.537738258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537761 env[1199]: time="2024-12-13T01:49:01.537757524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537804 env[1199]: time="2024-12-13T01:49:01.537771651Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537804 env[1199]: time="2024-12-13T01:49:01.537782812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537804 env[1199]: time="2024-12-13T01:49:01.537792880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537881 env[1199]: time="2024-12-13T01:49:01.537808109Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:49:01.537954 env[1199]: time="2024-12-13T01:49:01.537929797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.537954 env[1199]: time="2024-12-13T01:49:01.537949524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.538023 env[1199]: time="2024-12-13T01:49:01.537963270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.538023 env[1199]: time="2024-12-13T01:49:01.537973619Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:49:01.538023 env[1199]: time="2024-12-13T01:49:01.537985902Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:49:01.538023 env[1199]: time="2024-12-13T01:49:01.538011070Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:49:01.538104 env[1199]: time="2024-12-13T01:49:01.538038541Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:49:01.538104 env[1199]: time="2024-12-13T01:49:01.538085930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:49:01.538363 env[1199]: time="2024-12-13T01:49:01.538292508Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:49:01.538363 env[1199]: time="2024-12-13T01:49:01.538353672Z" level=info msg="Connect containerd service" Dec 13 01:49:01.539087 env[1199]: time="2024-12-13T01:49:01.538383498Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:49:01.539087 env[1199]: time="2024-12-13T01:49:01.539030111Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:49:01.539183 env[1199]: time="2024-12-13T01:49:01.539145988Z" level=info msg="Start subscribing containerd event" Dec 13 01:49:01.539209 env[1199]: time="2024-12-13T01:49:01.539201012Z" level=info msg="Start recovering state" Dec 13 01:49:01.539278 env[1199]: time="2024-12-13T01:49:01.539264230Z" level=info msg="Start event monitor" Dec 13 01:49:01.539304 env[1199]: time="2024-12-13T01:49:01.539285660Z" level=info msg="Start snapshots syncer" Dec 13 01:49:01.539304 env[1199]: time="2024-12-13T01:49:01.539299136Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:49:01.539344 env[1199]: time="2024-12-13T01:49:01.539305758Z" level=info msg="Start streaming server" Dec 13 01:49:01.539693 env[1199]: time="2024-12-13T01:49:01.539644704Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:49:01.539745 env[1199]: time="2024-12-13T01:49:01.539729142Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:49:01.539819 systemd[1]: Started containerd.service. Dec 13 01:49:01.548583 env[1199]: time="2024-12-13T01:49:01.547194766Z" level=info msg="containerd successfully booted in 0.103500s" Dec 13 01:49:01.590365 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:49:01.644615 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:49:01.644680 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:49:01.664161 systemd-networkd[1028]: eth0: Gained IPv6LL Dec 13 01:49:01.665856 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:49:01.667195 systemd[1]: Reached target network-online.target. Dec 13 01:49:01.669728 systemd[1]: Starting kubelet.service... Dec 13 01:49:02.074036 sshd_keygen[1196]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:49:02.106149 systemd[1]: Finished sshd-keygen.service. Dec 13 01:49:02.109557 systemd[1]: Starting issuegen.service... Dec 13 01:49:02.115620 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:49:02.115753 systemd[1]: Finished issuegen.service. Dec 13 01:49:02.118014 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:49:02.125825 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:49:02.128256 systemd[1]: Started getty@tty1.service. Dec 13 01:49:02.131914 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:49:02.133195 systemd[1]: Reached target getty.target. Dec 13 01:49:02.616619 systemd[1]: Started kubelet.service. Dec 13 01:49:02.618439 systemd[1]: Reached target multi-user.target. Dec 13 01:49:02.621551 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:49:02.630751 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:49:02.630912 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:49:02.632031 systemd[1]: Startup finished in 788ms (kernel) + 4.158s (initrd) + 6.151s (userspace) = 11.098s. Dec 13 01:49:03.498493 kubelet[1257]: E1213 01:49:03.498390 1257 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:49:03.500719 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:49:03.500863 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:49:03.501131 systemd[1]: kubelet.service: Consumed 1.701s CPU time. Dec 13 01:49:06.122200 systemd[1]: Created slice system-sshd.slice. Dec 13 01:49:06.123179 systemd[1]: Started sshd@0-10.0.0.28:22-10.0.0.1:50146.service. Dec 13 01:49:06.166339 sshd[1267]: Accepted publickey for core from 10.0.0.1 port 50146 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.168151 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.176572 systemd[1]: Created slice user-500.slice. Dec 13 01:49:06.177970 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:49:06.179750 systemd-logind[1189]: New session 1 of user core. Dec 13 01:49:06.186133 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:49:06.187449 systemd[1]: Starting user@500.service... Dec 13 01:49:06.190449 (systemd)[1270]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.268481 systemd[1270]: Queued start job for default target default.target. Dec 13 01:49:06.269009 systemd[1270]: Reached target paths.target. Dec 13 01:49:06.269030 systemd[1270]: Reached target sockets.target. Dec 13 01:49:06.269043 systemd[1270]: Reached target timers.target. Dec 13 01:49:06.269054 systemd[1270]: Reached target basic.target. Dec 13 01:49:06.269092 systemd[1270]: Reached target default.target. Dec 13 01:49:06.269115 systemd[1270]: Startup finished in 72ms. Dec 13 01:49:06.269255 systemd[1]: Started user@500.service. Dec 13 01:49:06.270557 systemd[1]: Started session-1.scope. Dec 13 01:49:06.325147 systemd[1]: Started sshd@1-10.0.0.28:22-10.0.0.1:50162.service. Dec 13 01:49:06.365764 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 50162 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.366913 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.370184 systemd-logind[1189]: New session 2 of user core. Dec 13 01:49:06.371156 systemd[1]: Started session-2.scope. Dec 13 01:49:06.425840 sshd[1279]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:06.428572 systemd[1]: sshd@1-10.0.0.28:22-10.0.0.1:50162.service: Deactivated successfully. Dec 13 01:49:06.429117 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 01:49:06.429604 systemd-logind[1189]: Session 2 logged out. Waiting for processes to exit. Dec 13 01:49:06.430600 systemd[1]: Started sshd@2-10.0.0.28:22-10.0.0.1:50170.service. Dec 13 01:49:06.431307 systemd-logind[1189]: Removed session 2. Dec 13 01:49:06.469974 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 50170 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.471059 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.474287 systemd-logind[1189]: New session 3 of user core. Dec 13 01:49:06.475107 systemd[1]: Started session-3.scope. Dec 13 01:49:06.524646 sshd[1285]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:06.527339 systemd[1]: sshd@2-10.0.0.28:22-10.0.0.1:50170.service: Deactivated successfully. Dec 13 01:49:06.527845 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 01:49:06.528337 systemd-logind[1189]: Session 3 logged out. Waiting for processes to exit. Dec 13 01:49:06.529380 systemd[1]: Started sshd@3-10.0.0.28:22-10.0.0.1:50172.service. Dec 13 01:49:06.530018 systemd-logind[1189]: Removed session 3. Dec 13 01:49:06.569185 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 50172 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.570622 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.573844 systemd-logind[1189]: New session 4 of user core. Dec 13 01:49:06.574542 systemd[1]: Started session-4.scope. Dec 13 01:49:06.628318 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:06.631328 systemd[1]: sshd@3-10.0.0.28:22-10.0.0.1:50172.service: Deactivated successfully. Dec 13 01:49:06.631974 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:49:06.632608 systemd-logind[1189]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:49:06.633833 systemd[1]: Started sshd@4-10.0.0.28:22-10.0.0.1:50176.service. Dec 13 01:49:06.634482 systemd-logind[1189]: Removed session 4. Dec 13 01:49:06.675375 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 50176 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.676558 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.680018 systemd-logind[1189]: New session 5 of user core. Dec 13 01:49:06.680862 systemd[1]: Started session-5.scope. Dec 13 01:49:06.736327 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:49:06.736527 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:49:06.746202 dbus-daemon[1179]: \xd0]\_\xf5U: received setenforce notice (enforcing=-1848817280) Dec 13 01:49:06.748214 sudo[1300]: pam_unix(sudo:session): session closed for user root Dec 13 01:49:06.749903 sshd[1297]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:06.752643 systemd[1]: sshd@4-10.0.0.28:22-10.0.0.1:50176.service: Deactivated successfully. Dec 13 01:49:06.753180 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:49:06.753685 systemd-logind[1189]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:49:06.754779 systemd[1]: Started sshd@5-10.0.0.28:22-10.0.0.1:50178.service. Dec 13 01:49:06.755435 systemd-logind[1189]: Removed session 5. Dec 13 01:49:06.793830 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 50178 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.794935 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.797969 systemd-logind[1189]: New session 6 of user core. Dec 13 01:49:06.798771 systemd[1]: Started session-6.scope. Dec 13 01:49:06.850352 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:49:06.850546 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:49:06.852771 sudo[1308]: pam_unix(sudo:session): session closed for user root Dec 13 01:49:06.857203 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:49:06.857401 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:49:06.865645 systemd[1]: Stopping audit-rules.service... Dec 13 01:49:06.865000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:49:06.867047 auditctl[1311]: No rules Dec 13 01:49:06.867427 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:49:06.867608 systemd[1]: Stopped audit-rules.service. Dec 13 01:49:06.867801 kernel: kauditd_printk_skb: 235 callbacks suppressed Dec 13 01:49:06.867830 kernel: audit: type=1305 audit(1734054546.865:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:49:06.872025 kernel: audit: type=1300 audit(1734054546.865:197): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde77a5050 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:06.865000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde77a5050 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:06.869265 systemd[1]: Starting audit-rules.service... Dec 13 01:49:06.876020 kernel: audit: type=1327 audit(1734054546.865:197): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:49:06.865000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:49:06.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.879409 kernel: audit: type=1131 audit(1734054546.865:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.885125 augenrules[1328]: No rules Dec 13 01:49:06.885778 systemd[1]: Finished audit-rules.service. Dec 13 01:49:06.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.886569 sudo[1307]: pam_unix(sudo:session): session closed for user root Dec 13 01:49:06.887828 sshd[1304]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:06.885000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.890680 systemd[1]: sshd@5-10.0.0.28:22-10.0.0.1:50178.service: Deactivated successfully. Dec 13 01:49:06.891295 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:49:06.891861 systemd-logind[1189]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:49:06.893158 systemd[1]: Started sshd@6-10.0.0.28:22-10.0.0.1:50184.service. Dec 13 01:49:06.893449 kernel: audit: type=1130 audit(1734054546.885:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.893483 kernel: audit: type=1106 audit(1734054546.885:200): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.893503 kernel: audit: type=1104 audit(1734054546.885:201): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.885000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.894505 systemd-logind[1189]: Removed session 6. Dec 13 01:49:06.885000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.901363 kernel: audit: type=1106 audit(1734054546.885:202): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.901413 kernel: audit: type=1104 audit(1734054546.885:203): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.885000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.904960 kernel: audit: type=1131 audit(1734054546.889:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.28:22-10.0.0.1:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.28:22-10.0.0.1:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.28:22-10.0.0.1:50184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.936000 audit[1334]: USER_ACCT pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.938175 sshd[1334]: Accepted publickey for core from 10.0.0.1 port 50184 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:06.938000 audit[1334]: CRED_ACQ pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.938000 audit[1334]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc347de80 a2=3 a3=0 items=0 ppid=1 pid=1334 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:06.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:06.939864 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:06.943835 systemd-logind[1189]: New session 7 of user core. Dec 13 01:49:06.944850 systemd[1]: Started session-7.scope. Dec 13 01:49:06.948000 audit[1334]: USER_START pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.949000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:06.998000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.998000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:06.999308 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:49:06.999523 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:49:07.000000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:07.011874 systemd[1]: Starting coreos-metadata.service... Dec 13 01:49:07.018510 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 01:49:07.018684 systemd[1]: Finished coreos-metadata.service. Dec 13 01:49:07.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:07.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:07.778021 systemd[1]: Stopped kubelet.service. Dec 13 01:49:07.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:07.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:07.778180 systemd[1]: kubelet.service: Consumed 1.701s CPU time. Dec 13 01:49:07.779923 systemd[1]: Starting kubelet.service... Dec 13 01:49:07.798560 systemd[1]: Reloading. Dec 13 01:49:07.859806 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2024-12-13T01:49:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:49:07.859838 /usr/lib/systemd/system-generators/torcx-generator[1404]: time="2024-12-13T01:49:07Z" level=info msg="torcx already run" Dec 13 01:49:08.231179 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:49:08.231203 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:49:08.251561 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit: BPF prog-id=40 op=LOAD Dec 13 01:49:08.308000 audit: BPF prog-id=34 op=UNLOAD Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.308000 audit: BPF prog-id=41 op=LOAD Dec 13 01:49:08.308000 audit: BPF prog-id=38 op=UNLOAD Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit: BPF prog-id=42 op=LOAD Dec 13 01:49:08.309000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit: BPF prog-id=43 op=LOAD Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.309000 audit: BPF prog-id=44 op=LOAD Dec 13 01:49:08.309000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:49:08.309000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit: BPF prog-id=45 op=LOAD Dec 13 01:49:08.310000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit: BPF prog-id=46 op=LOAD Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit: BPF prog-id=47 op=LOAD Dec 13 01:49:08.310000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:49:08.310000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit: BPF prog-id=48 op=LOAD Dec 13 01:49:08.311000 audit: BPF prog-id=33 op=UNLOAD Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.311000 audit: BPF prog-id=49 op=LOAD Dec 13 01:49:08.311000 audit: BPF prog-id=30 op=UNLOAD Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit: BPF prog-id=50 op=LOAD Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.315000 audit: BPF prog-id=51 op=LOAD Dec 13 01:49:08.315000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:49:08.315000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit: BPF prog-id=52 op=LOAD Dec 13 01:49:08.317000 audit: BPF prog-id=35 op=UNLOAD Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit: BPF prog-id=53 op=LOAD Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.317000 audit: BPF prog-id=54 op=LOAD Dec 13 01:49:08.317000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:49:08.317000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:49:08.327459 systemd[1]: Started kubelet.service. Dec 13 01:49:08.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:08.330623 systemd[1]: Stopping kubelet.service... Dec 13 01:49:08.330939 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:49:08.331143 systemd[1]: Stopped kubelet.service. Dec 13 01:49:08.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:08.332618 systemd[1]: Starting kubelet.service... Dec 13 01:49:08.411456 systemd[1]: Started kubelet.service. Dec 13 01:49:08.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:08.515182 kubelet[1452]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:49:08.515182 kubelet[1452]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:49:08.515182 kubelet[1452]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:49:08.515182 kubelet[1452]: I1213 01:49:08.515147 1452 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:49:08.872480 kubelet[1452]: I1213 01:49:08.872356 1452 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 01:49:08.872480 kubelet[1452]: I1213 01:49:08.872399 1452 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:49:08.872758 kubelet[1452]: I1213 01:49:08.872732 1452 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 01:49:08.895835 kubelet[1452]: I1213 01:49:08.895739 1452 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:49:08.908591 kubelet[1452]: I1213 01:49:08.908528 1452 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:49:08.913547 kubelet[1452]: I1213 01:49:08.913506 1452 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:49:08.913756 kubelet[1452]: I1213 01:49:08.913727 1452 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:49:08.914176 kubelet[1452]: I1213 01:49:08.914149 1452 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:49:08.914176 kubelet[1452]: I1213 01:49:08.914167 1452 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:49:08.914348 kubelet[1452]: I1213 01:49:08.914325 1452 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:49:08.914475 kubelet[1452]: I1213 01:49:08.914460 1452 kubelet.go:396] "Attempting to sync node with API server" Dec 13 01:49:08.914541 kubelet[1452]: I1213 01:49:08.914484 1452 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:49:08.914541 kubelet[1452]: I1213 01:49:08.914525 1452 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:49:08.914541 kubelet[1452]: I1213 01:49:08.914545 1452 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:49:08.914884 kubelet[1452]: E1213 01:49:08.914844 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:08.914955 kubelet[1452]: E1213 01:49:08.914901 1452 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:08.917484 kubelet[1452]: I1213 01:49:08.917462 1452 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:49:08.919729 kubelet[1452]: W1213 01:49:08.919692 1452 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.0.0.28" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 01:49:08.919729 kubelet[1452]: E1213 01:49:08.919731 1452 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.28" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 01:49:08.919828 kubelet[1452]: W1213 01:49:08.919820 1452 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 01:49:08.919868 kubelet[1452]: I1213 01:49:08.919822 1452 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:49:08.919868 kubelet[1452]: E1213 01:49:08.919839 1452 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 01:49:08.922038 kubelet[1452]: W1213 01:49:08.922006 1452 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:49:08.922727 kubelet[1452]: I1213 01:49:08.922678 1452 server.go:1256] "Started kubelet" Dec 13 01:49:08.922911 kubelet[1452]: I1213 01:49:08.922747 1452 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:49:08.928000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.928000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:08.928000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000775e90 a1=c00060dda0 a2=c000775e60 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:08.928000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:08.928000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.928000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:08.928000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007e1060 a1=c00060ddb8 a2=c000775f20 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:08.928000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:08.929885 kubelet[1452]: I1213 01:49:08.929236 1452 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:49:08.929885 kubelet[1452]: I1213 01:49:08.929285 1452 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:49:08.929885 kubelet[1452]: I1213 01:49:08.929368 1452 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:49:08.931274 kubelet[1452]: I1213 01:49:08.931248 1452 server.go:461] "Adding debug handlers to kubelet server" Dec 13 01:49:08.931584 kubelet[1452]: I1213 01:49:08.931556 1452 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:49:08.931971 kubelet[1452]: I1213 01:49:08.931946 1452 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:49:08.933505 kubelet[1452]: I1213 01:49:08.932592 1452 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:49:08.933505 kubelet[1452]: I1213 01:49:08.932749 1452 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 01:49:08.933505 kubelet[1452]: I1213 01:49:08.932819 1452 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 01:49:08.981823 kubelet[1452]: E1213 01:49:08.981758 1452 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.28\" not found" node="10.0.0.28" Dec 13 01:49:08.984851 kubelet[1452]: I1213 01:49:08.984827 1452 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:49:08.984851 kubelet[1452]: I1213 01:49:08.984848 1452 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:49:08.984983 kubelet[1452]: E1213 01:49:08.984831 1452 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:49:08.984983 kubelet[1452]: I1213 01:49:08.984962 1452 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:49:08.996564 kubelet[1452]: I1213 01:49:08.996526 1452 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:49:08.996564 kubelet[1452]: I1213 01:49:08.996551 1452 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:49:08.996564 kubelet[1452]: I1213 01:49:08.996573 1452 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:49:09.033650 kubelet[1452]: I1213 01:49:09.033606 1452 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.28" Dec 13 01:49:09.126955 kubelet[1452]: I1213 01:49:09.126799 1452 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.28" Dec 13 01:49:09.343020 kubelet[1452]: E1213 01:49:09.342943 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" Dec 13 01:49:09.443862 kubelet[1452]: E1213 01:49:09.443692 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" Dec 13 01:49:09.544345 kubelet[1452]: E1213 01:49:09.544282 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" Dec 13 01:49:09.573427 kubelet[1452]: I1213 01:49:09.573360 1452 policy_none.go:49] "None policy: Start" Dec 13 01:49:09.574497 kubelet[1452]: I1213 01:49:09.574459 1452 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:49:09.574497 kubelet[1452]: I1213 01:49:09.574502 1452 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:49:09.584000 audit[1469]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.584000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc40afc080 a2=0 a3=7ffc40afc06c items=0 ppid=1452 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:49:09.585505 systemd[1]: Created slice kubepods.slice. Dec 13 01:49:09.586000 audit[1472]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.586000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe844647a0 a2=0 a3=7ffe8446478c items=0 ppid=1452 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:49:09.590462 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:49:09.593453 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:49:09.600686 kubelet[1452]: I1213 01:49:09.600640 1452 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:49:09.599000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:09.599000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:09.599000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b53440 a1=c000edf308 a2=c000b53410 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.599000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:09.601094 kubelet[1452]: I1213 01:49:09.600707 1452 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:49:09.603566 kubelet[1452]: E1213 01:49:09.603540 1452 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.28\" not found" Dec 13 01:49:09.604278 kubelet[1452]: I1213 01:49:09.604256 1452 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:49:09.589000 audit[1474]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.589000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd897f2c00 a2=0 a3=7ffd897f2bec items=0 ppid=1452 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:09.613000 audit[1479]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.613000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff00dd5200 a2=0 a3=7fff00dd51ec items=0 ppid=1452 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:09.645072 kubelet[1452]: E1213 01:49:09.645005 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" Dec 13 01:49:09.654000 audit[1484]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.654000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffda0348d50 a2=0 a3=7ffda0348d3c items=0 ppid=1452 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:49:09.655457 kubelet[1452]: I1213 01:49:09.655426 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:49:09.655000 audit[1485]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:09.655000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4e54b800 a2=0 a3=7ffe4e54b7ec items=0 ppid=1452 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:49:09.655000 audit[1486]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.655000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2f837cb0 a2=0 a3=7ffd2f837c9c items=0 ppid=1452 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:49:09.656833 kubelet[1452]: I1213 01:49:09.656637 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:49:09.656833 kubelet[1452]: I1213 01:49:09.656710 1452 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:49:09.656833 kubelet[1452]: I1213 01:49:09.656747 1452 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 01:49:09.656932 kubelet[1452]: E1213 01:49:09.656923 1452 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 01:49:09.656000 audit[1488]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.656000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec3e240e0 a2=0 a3=7ffec3e240cc items=0 ppid=1452 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:49:09.657000 audit[1487]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:09.657000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd642e5cb0 a2=0 a3=7ffd642e5c9c items=0 ppid=1452 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:49:09.658000 audit[1489]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:09.658000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff13a64310 a2=0 a3=7fff13a642fc items=0 ppid=1452 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:49:09.658000 audit[1490]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:09.658000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe99241b50 a2=0 a3=7ffe99241b3c items=0 ppid=1452 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:49:09.659000 audit[1491]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:09.659000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4859ab30 a2=0 a3=7fff4859ab1c items=0 ppid=1452 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:49:09.746109 kubelet[1452]: E1213 01:49:09.745919 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.28\" not found" Dec 13 01:49:09.847551 kubelet[1452]: I1213 01:49:09.847517 1452 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 01:49:09.848017 env[1199]: time="2024-12-13T01:49:09.847943357Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:49:09.848277 kubelet[1452]: I1213 01:49:09.848179 1452 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 01:49:09.877861 kubelet[1452]: I1213 01:49:09.877814 1452 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 01:49:09.878046 kubelet[1452]: W1213 01:49:09.878030 1452 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:49:09.878079 kubelet[1452]: W1213 01:49:09.878068 1452 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:49:09.878128 kubelet[1452]: W1213 01:49:09.878101 1452 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:49:09.878164 kubelet[1452]: W1213 01:49:09.878140 1452 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Node ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:49:09.915227 kubelet[1452]: I1213 01:49:09.915187 1452 apiserver.go:52] "Watching apiserver" Dec 13 01:49:09.915227 kubelet[1452]: E1213 01:49:09.915219 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:09.922845 kubelet[1452]: I1213 01:49:09.922813 1452 topology_manager.go:215] "Topology Admit Handler" podUID="ba3cc825-9dc4-47c0-a55e-9baa403fe047" podNamespace="calico-system" podName="calico-node-kp46c" Dec 13 01:49:09.923010 kubelet[1452]: I1213 01:49:09.922965 1452 topology_manager.go:215] "Topology Admit Handler" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" podNamespace="calico-system" podName="csi-node-driver-66jmt" Dec 13 01:49:09.923055 kubelet[1452]: I1213 01:49:09.923030 1452 topology_manager.go:215] "Topology Admit Handler" podUID="6c39db24-4aa1-469c-bc76-1f00c440c18a" podNamespace="kube-system" podName="kube-proxy-svhtj" Dec 13 01:49:09.923329 kubelet[1452]: E1213 01:49:09.923300 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:09.928565 systemd[1]: Created slice kubepods-besteffort-pod6c39db24_4aa1_469c_bc76_1f00c440c18a.slice. Dec 13 01:49:09.928852 sudo[1337]: pam_unix(sudo:session): session closed for user root Dec 13 01:49:09.928000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:09.928000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:09.930264 sshd[1334]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:09.930000 audit[1334]: USER_END pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:09.930000 audit[1334]: CRED_DISP pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:09.932403 systemd[1]: sshd@6-10.0.0.28:22-10.0.0.1:50184.service: Deactivated successfully. Dec 13 01:49:09.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.28:22-10.0.0.1:50184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:09.933148 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:49:09.933863 systemd-logind[1189]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:49:09.935687 kubelet[1452]: I1213 01:49:09.935658 1452 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 01:49:09.939506 kubelet[1452]: I1213 01:49:09.939467 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-lib-modules\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939606 kubelet[1452]: I1213 01:49:09.939557 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-xtables-lock\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939606 kubelet[1452]: I1213 01:49:09.939597 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-cni-bin-dir\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939668 kubelet[1452]: I1213 01:49:09.939625 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/31dbc540-8737-4500-8869-4ca48099a8a8-registration-dir\") pod \"csi-node-driver-66jmt\" (UID: \"31dbc540-8737-4500-8869-4ca48099a8a8\") " pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:09.939668 kubelet[1452]: I1213 01:49:09.939649 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5gxxv\" (UniqueName: \"kubernetes.io/projected/31dbc540-8737-4500-8869-4ca48099a8a8-kube-api-access-5gxxv\") pod \"csi-node-driver-66jmt\" (UID: \"31dbc540-8737-4500-8869-4ca48099a8a8\") " pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:09.939668 kubelet[1452]: I1213 01:49:09.939669 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6c39db24-4aa1-469c-bc76-1f00c440c18a-kube-proxy\") pod \"kube-proxy-svhtj\" (UID: \"6c39db24-4aa1-469c-bc76-1f00c440c18a\") " pod="kube-system/kube-proxy-svhtj" Dec 13 01:49:09.939733 kubelet[1452]: I1213 01:49:09.939688 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6c39db24-4aa1-469c-bc76-1f00c440c18a-xtables-lock\") pod \"kube-proxy-svhtj\" (UID: \"6c39db24-4aa1-469c-bc76-1f00c440c18a\") " pod="kube-system/kube-proxy-svhtj" Dec 13 01:49:09.939733 kubelet[1452]: I1213 01:49:09.939707 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cckgx\" (UniqueName: \"kubernetes.io/projected/6c39db24-4aa1-469c-bc76-1f00c440c18a-kube-api-access-cckgx\") pod \"kube-proxy-svhtj\" (UID: \"6c39db24-4aa1-469c-bc76-1f00c440c18a\") " pod="kube-system/kube-proxy-svhtj" Dec 13 01:49:09.939733 kubelet[1452]: I1213 01:49:09.939726 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-policysync\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939802 kubelet[1452]: I1213 01:49:09.939747 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ba3cc825-9dc4-47c0-a55e-9baa403fe047-tigera-ca-bundle\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939802 kubelet[1452]: I1213 01:49:09.939765 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-var-lib-calico\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939847 kubelet[1452]: I1213 01:49:09.939812 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-cni-log-dir\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939847 kubelet[1452]: I1213 01:49:09.939839 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-flexvol-driver-host\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.939958 kubelet[1452]: I1213 01:49:09.939923 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/31dbc540-8737-4500-8869-4ca48099a8a8-kubelet-dir\") pod \"csi-node-driver-66jmt\" (UID: \"31dbc540-8737-4500-8869-4ca48099a8a8\") " pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:09.940202 kubelet[1452]: I1213 01:49:09.939969 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/31dbc540-8737-4500-8869-4ca48099a8a8-socket-dir\") pod \"csi-node-driver-66jmt\" (UID: \"31dbc540-8737-4500-8869-4ca48099a8a8\") " pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:09.940202 kubelet[1452]: I1213 01:49:09.940049 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zczbz\" (UniqueName: \"kubernetes.io/projected/ba3cc825-9dc4-47c0-a55e-9baa403fe047-kube-api-access-zczbz\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.940202 kubelet[1452]: I1213 01:49:09.940083 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/31dbc540-8737-4500-8869-4ca48099a8a8-varrun\") pod \"csi-node-driver-66jmt\" (UID: \"31dbc540-8737-4500-8869-4ca48099a8a8\") " pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:09.940202 kubelet[1452]: I1213 01:49:09.940108 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6c39db24-4aa1-469c-bc76-1f00c440c18a-lib-modules\") pod \"kube-proxy-svhtj\" (UID: \"6c39db24-4aa1-469c-bc76-1f00c440c18a\") " pod="kube-system/kube-proxy-svhtj" Dec 13 01:49:09.940202 kubelet[1452]: I1213 01:49:09.940126 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ba3cc825-9dc4-47c0-a55e-9baa403fe047-node-certs\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.940317 kubelet[1452]: I1213 01:49:09.940167 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-var-run-calico\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.940317 kubelet[1452]: I1213 01:49:09.940195 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ba3cc825-9dc4-47c0-a55e-9baa403fe047-cni-net-dir\") pod \"calico-node-kp46c\" (UID: \"ba3cc825-9dc4-47c0-a55e-9baa403fe047\") " pod="calico-system/calico-node-kp46c" Dec 13 01:49:09.946314 systemd-logind[1189]: Removed session 7. Dec 13 01:49:09.948622 systemd[1]: Created slice kubepods-besteffort-podba3cc825_9dc4_47c0_a55e_9baa403fe047.slice. Dec 13 01:49:10.042683 kubelet[1452]: E1213 01:49:10.042567 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:10.042683 kubelet[1452]: W1213 01:49:10.042601 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:10.042683 kubelet[1452]: E1213 01:49:10.042633 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:10.044569 kubelet[1452]: E1213 01:49:10.044543 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:10.044569 kubelet[1452]: W1213 01:49:10.044566 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:10.044677 kubelet[1452]: E1213 01:49:10.044597 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:10.050661 kubelet[1452]: E1213 01:49:10.050442 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:10.050661 kubelet[1452]: W1213 01:49:10.050459 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:10.050661 kubelet[1452]: E1213 01:49:10.050478 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:10.050661 kubelet[1452]: E1213 01:49:10.050627 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:10.050661 kubelet[1452]: W1213 01:49:10.050634 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:10.050661 kubelet[1452]: E1213 01:49:10.050643 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:10.055390 kubelet[1452]: E1213 01:49:10.055373 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:10.055390 kubelet[1452]: W1213 01:49:10.055386 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:10.055471 kubelet[1452]: E1213 01:49:10.055409 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:10.246801 kubelet[1452]: E1213 01:49:10.246737 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:10.247636 env[1199]: time="2024-12-13T01:49:10.247572668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-svhtj,Uid:6c39db24-4aa1-469c-bc76-1f00c440c18a,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:10.250256 kubelet[1452]: E1213 01:49:10.250238 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:10.250751 env[1199]: time="2024-12-13T01:49:10.250684946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kp46c,Uid:ba3cc825-9dc4-47c0-a55e-9baa403fe047,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:10.812442 env[1199]: time="2024-12-13T01:49:10.812381067Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.813465 env[1199]: time="2024-12-13T01:49:10.813422130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.815839 env[1199]: time="2024-12-13T01:49:10.815791223Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.816970 env[1199]: time="2024-12-13T01:49:10.816946460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.818418 env[1199]: time="2024-12-13T01:49:10.818390769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.819489 env[1199]: time="2024-12-13T01:49:10.819452992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.823282 env[1199]: time="2024-12-13T01:49:10.823234996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.826100 env[1199]: time="2024-12-13T01:49:10.826056188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:10.851610 env[1199]: time="2024-12-13T01:49:10.851405215Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:10.851610 env[1199]: time="2024-12-13T01:49:10.851453576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:10.851610 env[1199]: time="2024-12-13T01:49:10.851467963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:10.851889 env[1199]: time="2024-12-13T01:49:10.851664812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a88eaaf56662ea2c569ab21b8fe0fced17122347003937f449e2447075c653b2 pid=1518 runtime=io.containerd.runc.v2 Dec 13 01:49:10.852873 env[1199]: time="2024-12-13T01:49:10.852776678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:10.852873 env[1199]: time="2024-12-13T01:49:10.852828264Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:10.852873 env[1199]: time="2024-12-13T01:49:10.852839876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:10.853127 env[1199]: time="2024-12-13T01:49:10.853020866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9 pid=1515 runtime=io.containerd.runc.v2 Dec 13 01:49:10.870530 systemd[1]: Started cri-containerd-a88eaaf56662ea2c569ab21b8fe0fced17122347003937f449e2447075c653b2.scope. Dec 13 01:49:10.877659 systemd[1]: Started cri-containerd-e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9.scope. Dec 13 01:49:10.916522 kubelet[1452]: E1213 01:49:10.915779 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.940000 audit: BPF prog-id=55 op=LOAD Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1518 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386561616635363636326561326335363961623231623866653066 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1518 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386561616635363636326561326335363961623231623866653066 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit: BPF prog-id=56 op=LOAD Dec 13 01:49:10.941000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000211100 items=0 ppid=1518 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386561616635363636326561326335363961623231623866653066 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.941000 audit: BPF prog-id=57 op=LOAD Dec 13 01:49:10.941000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000211148 items=0 ppid=1518 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386561616635363636326561326335363961623231623866653066 Dec 13 01:49:10.942000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:49:10.942000 audit: BPF prog-id=56 op=UNLOAD Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.942000 audit: BPF prog-id=58 op=LOAD Dec 13 01:49:10.942000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000211558 items=0 ppid=1518 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386561616635363636326561326335363961623231623866653066 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.953000 audit: BPF prog-id=59 op=LOAD Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1515 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326564363930333338616437623132326162373230623435633137 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1515 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326564363930333338616437623132326162373230623435633137 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.954000 audit: BPF prog-id=60 op=LOAD Dec 13 01:49:10.954000 audit[1536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dda60 items=0 ppid=1515 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326564363930333338616437623132326162373230623435633137 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit: BPF prog-id=61 op=LOAD Dec 13 01:49:10.955000 audit[1536]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001ddaa8 items=0 ppid=1515 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326564363930333338616437623132326162373230623435633137 Dec 13 01:49:10.955000 audit: BPF prog-id=61 op=UNLOAD Dec 13 01:49:10.955000 audit: BPF prog-id=60 op=UNLOAD Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { perfmon } for pid=1536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit[1536]: AVC avc: denied { bpf } for pid=1536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:10.955000 audit: BPF prog-id=62 op=LOAD Dec 13 01:49:10.955000 audit[1536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001ddeb8 items=0 ppid=1515 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:10.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326564363930333338616437623132326162373230623435633137 Dec 13 01:49:10.966647 env[1199]: time="2024-12-13T01:49:10.966589658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-svhtj,Uid:6c39db24-4aa1-469c-bc76-1f00c440c18a,Namespace:kube-system,Attempt:0,} returns sandbox id \"a88eaaf56662ea2c569ab21b8fe0fced17122347003937f449e2447075c653b2\"" Dec 13 01:49:10.967610 kubelet[1452]: E1213 01:49:10.967574 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:10.969462 env[1199]: time="2024-12-13T01:49:10.969425517Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 01:49:10.970363 env[1199]: time="2024-12-13T01:49:10.970315196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kp46c,Uid:ba3cc825-9dc4-47c0-a55e-9baa403fe047,Namespace:calico-system,Attempt:0,} returns sandbox id \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\"" Dec 13 01:49:10.971048 kubelet[1452]: E1213 01:49:10.971021 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:11.050141 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1100524269.mount: Deactivated successfully. Dec 13 01:49:11.658410 kubelet[1452]: E1213 01:49:11.658360 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:11.916797 kubelet[1452]: E1213 01:49:11.916642 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:12.205217 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1865616052.mount: Deactivated successfully. Dec 13 01:49:12.917617 kubelet[1452]: E1213 01:49:12.917550 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:13.067069 env[1199]: time="2024-12-13T01:49:13.066999346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:13.069231 env[1199]: time="2024-12-13T01:49:13.069173925Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:13.070591 env[1199]: time="2024-12-13T01:49:13.070560586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:13.072074 env[1199]: time="2024-12-13T01:49:13.072034020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:13.072547 env[1199]: time="2024-12-13T01:49:13.072487831Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 01:49:13.073357 env[1199]: time="2024-12-13T01:49:13.073318219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:49:13.075036 env[1199]: time="2024-12-13T01:49:13.075002829Z" level=info msg="CreateContainer within sandbox \"a88eaaf56662ea2c569ab21b8fe0fced17122347003937f449e2447075c653b2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:49:13.092156 env[1199]: time="2024-12-13T01:49:13.092106160Z" level=info msg="CreateContainer within sandbox \"a88eaaf56662ea2c569ab21b8fe0fced17122347003937f449e2447075c653b2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"717a2f651728ec36c2fe06a7f105549b4d1ce574cf3c85c1f78fba336d7f633a\"" Dec 13 01:49:13.092960 env[1199]: time="2024-12-13T01:49:13.092916670Z" level=info msg="StartContainer for \"717a2f651728ec36c2fe06a7f105549b4d1ce574cf3c85c1f78fba336d7f633a\"" Dec 13 01:49:13.126455 systemd[1]: Started cri-containerd-717a2f651728ec36c2fe06a7f105549b4d1ce574cf3c85c1f78fba336d7f633a.scope. Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.156452 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 01:49:13.156528 kernel: audit: type=1400 audit(1734054553.153:449): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f0484157c28 items=0 ppid=1518 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.185810 kernel: audit: type=1300 audit(1734054553.153:449): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f0484157c28 items=0 ppid=1518 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.185902 kernel: audit: type=1327 audit(1734054553.153:449): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376132663635313732386563333663326665303661376631303535 Dec 13 01:49:13.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376132663635313732386563333663326665303661376631303535 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.203484 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.203557 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.209560 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.211170 systemd[1]: run-containerd-runc-k8s.io-717a2f651728ec36c2fe06a7f105549b4d1ce574cf3c85c1f78fba336d7f633a-runc.3YncJw.mount: Deactivated successfully. Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.215915 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.215983 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.222411 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.222510 kernel: audit: type=1400 audit(1734054553.153:450): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.153000 audit: BPF prog-id=63 op=LOAD Dec 13 01:49:13.153000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001b6618 items=0 ppid=1518 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376132663635313732386563333663326665303661376631303535 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.159000 audit: BPF prog-id=64 op=LOAD Dec 13 01:49:13.159000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001b6668 items=0 ppid=1518 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376132663635313732386563333663326665303661376631303535 Dec 13 01:49:13.190000 audit: BPF prog-id=64 op=UNLOAD Dec 13 01:49:13.190000 audit: BPF prog-id=63 op=UNLOAD Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:13.190000 audit: BPF prog-id=65 op=LOAD Dec 13 01:49:13.190000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001b66f8 items=0 ppid=1518 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376132663635313732386563333663326665303661376631303535 Dec 13 01:49:13.244566 env[1199]: time="2024-12-13T01:49:13.244479007Z" level=info msg="StartContainer for \"717a2f651728ec36c2fe06a7f105549b4d1ce574cf3c85c1f78fba336d7f633a\" returns successfully" Dec 13 01:49:13.295000 audit[1646]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.295000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd71982540 a2=0 a3=7ffd7198252c items=0 ppid=1604 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:49:13.296000 audit[1647]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.296000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef4d12f20 a2=0 a3=7ffef4d12f0c items=0 ppid=1604 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:49:13.297000 audit[1649]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.297000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1ddf8640 a2=0 a3=7ffd1ddf862c items=0 ppid=1604 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:49:13.297000 audit[1648]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.297000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3daaace0 a2=0 a3=7ffd3daaaccc items=0 ppid=1604 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:49:13.298000 audit[1651]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.298000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1ba610a0 a2=0 a3=7ffe1ba6108c items=0 ppid=1604 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:49:13.300000 audit[1650]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.300000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9dc73d30 a2=0 a3=7fff9dc73d1c items=0 ppid=1604 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:49:13.398000 audit[1653]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.398000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdc934bcd0 a2=0 a3=7ffdc934bcbc items=0 ppid=1604 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:49:13.402000 audit[1655]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.402000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe5ad61220 a2=0 a3=7ffe5ad6120c items=0 ppid=1604 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:49:13.407000 audit[1658]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.407000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd66a83dd0 a2=0 a3=7ffd66a83dbc items=0 ppid=1604 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:49:13.408000 audit[1659]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.408000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff36de3b10 a2=0 a3=7fff36de3afc items=0 ppid=1604 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:49:13.412000 audit[1661]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.412000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbb50c5c0 a2=0 a3=7ffcbb50c5ac items=0 ppid=1604 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:49:13.415000 audit[1662]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.415000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeffd8c0a0 a2=0 a3=7ffeffd8c08c items=0 ppid=1604 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:49:13.418000 audit[1664]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.418000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1a231a30 a2=0 a3=7ffc1a231a1c items=0 ppid=1604 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:49:13.423000 audit[1667]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.423000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb937b210 a2=0 a3=7ffdb937b1fc items=0 ppid=1604 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:49:13.425000 audit[1668]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.425000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd02a15e80 a2=0 a3=7ffd02a15e6c items=0 ppid=1604 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:49:13.429000 audit[1670]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.429000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc728e17f0 a2=0 a3=7ffc728e17dc items=0 ppid=1604 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:49:13.431000 audit[1671]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.431000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeed2d4c0 a2=0 a3=7ffeeed2d4ac items=0 ppid=1604 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:49:13.434000 audit[1673]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.434000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe102f0260 a2=0 a3=7ffe102f024c items=0 ppid=1604 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:49:13.439000 audit[1676]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.439000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcda0daad0 a2=0 a3=7ffcda0daabc items=0 ppid=1604 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:49:13.444000 audit[1679]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.444000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb78c1d60 a2=0 a3=7ffeb78c1d4c items=0 ppid=1604 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:49:13.446000 audit[1680]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.446000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe7b4f220 a2=0 a3=7fffe7b4f20c items=0 ppid=1604 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:49:13.449000 audit[1682]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.449000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdaef5e370 a2=0 a3=7ffdaef5e35c items=0 ppid=1604 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:13.484000 audit[1688]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.484000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda4500cc0 a2=0 a3=7ffda4500cac items=0 ppid=1604 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:13.486000 audit[1689]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.486000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3f919e80 a2=0 a3=7ffd3f919e6c items=0 ppid=1604 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:49:13.488000 audit[1691]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:13.488000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc0191e420 a2=0 a3=7ffc0191e40c items=0 ppid=1604 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:49:13.509000 audit[1697]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:13.509000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc99b08350 a2=0 a3=7ffc99b0833c items=0 ppid=1604 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:13.525000 audit[1697]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:13.525000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffc99b08350 a2=0 a3=7ffc99b0833c items=0 ppid=1604 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:13.527000 audit[1704]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.527000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffced294d90 a2=0 a3=7ffced294d7c items=0 ppid=1604 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:49:13.529000 audit[1706]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.529000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea903bf80 a2=0 a3=7ffea903bf6c items=0 ppid=1604 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:49:13.533000 audit[1709]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.533000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd70b50980 a2=0 a3=7ffd70b5096c items=0 ppid=1604 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:49:13.534000 audit[1710]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.534000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdd166650 a2=0 a3=7fffdd16663c items=0 ppid=1604 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:49:13.537000 audit[1712]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.537000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcde4fffc0 a2=0 a3=7ffcde4fffac items=0 ppid=1604 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:49:13.538000 audit[1713]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.538000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe701c9ec0 a2=0 a3=7ffe701c9eac items=0 ppid=1604 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:49:13.541000 audit[1715]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.541000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdcedf2040 a2=0 a3=7ffdcedf202c items=0 ppid=1604 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:49:13.544000 audit[1718]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.544000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff44d37b50 a2=0 a3=7fff44d37b3c items=0 ppid=1604 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:49:13.546000 audit[1719]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.546000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9c3ed5e0 a2=0 a3=7fff9c3ed5cc items=0 ppid=1604 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:49:13.548000 audit[1721]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.548000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffffc161d0 a2=0 a3=7fffffc161bc items=0 ppid=1604 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:49:13.549000 audit[1722]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.549000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe40a39600 a2=0 a3=7ffe40a395ec items=0 ppid=1604 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:49:13.551000 audit[1724]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.551000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6823d770 a2=0 a3=7ffd6823d75c items=0 ppid=1604 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:49:13.554000 audit[1727]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.554000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcca8e9f30 a2=0 a3=7ffcca8e9f1c items=0 ppid=1604 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:49:13.557000 audit[1730]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.557000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc96beff0 a2=0 a3=7ffdc96befdc items=0 ppid=1604 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:49:13.558000 audit[1731]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.558000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdaa8c6300 a2=0 a3=7ffdaa8c62ec items=0 ppid=1604 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:49:13.560000 audit[1733]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.560000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe51cbc490 a2=0 a3=7ffe51cbc47c items=0 ppid=1604 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:13.564000 audit[1736]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.564000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc823a26f0 a2=0 a3=7ffc823a26dc items=0 ppid=1604 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:13.565000 audit[1737]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.565000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc07d3e40 a2=0 a3=7ffdc07d3e2c items=0 ppid=1604 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:49:13.568000 audit[1739]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.568000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffcee75ad0 a2=0 a3=7fffcee75abc items=0 ppid=1604 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:49:13.569000 audit[1740]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.569000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce595cb10 a2=0 a3=7ffce595cafc items=0 ppid=1604 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:49:13.572000 audit[1742]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.572000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff313b6210 a2=0 a3=7fff313b61fc items=0 ppid=1604 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:13.576000 audit[1745]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:13.576000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3c0fda50 a2=0 a3=7ffe3c0fda3c items=0 ppid=1604 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:13.580000 audit[1747]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:49:13.580000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff86dc76a0 a2=0 a3=7fff86dc768c items=0 ppid=1604 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:13.580000 audit[1747]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:49:13.580000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff86dc76a0 a2=0 a3=7fff86dc768c items=0 ppid=1604 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:13.657881 kubelet[1452]: E1213 01:49:13.657826 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:13.668009 kubelet[1452]: E1213 01:49:13.667957 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:13.746385 kubelet[1452]: I1213 01:49:13.746228 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-svhtj" podStartSLOduration=2.641888896 podStartE2EDuration="4.746152113s" podCreationTimestamp="2024-12-13 01:49:09 +0000 UTC" firstStartedPulling="2024-12-13 01:49:10.968751052 +0000 UTC m=+2.552782421" lastFinishedPulling="2024-12-13 01:49:13.073014279 +0000 UTC m=+4.657045638" observedRunningTime="2024-12-13 01:49:13.745982384 +0000 UTC m=+5.330013753" watchObservedRunningTime="2024-12-13 01:49:13.746152113 +0000 UTC m=+5.330183492" Dec 13 01:49:13.760388 kubelet[1452]: E1213 01:49:13.760336 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.760388 kubelet[1452]: W1213 01:49:13.760365 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.760388 kubelet[1452]: E1213 01:49:13.760393 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.760696 kubelet[1452]: E1213 01:49:13.760658 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.760696 kubelet[1452]: W1213 01:49:13.760686 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.760748 kubelet[1452]: E1213 01:49:13.760717 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.760976 kubelet[1452]: E1213 01:49:13.760947 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.760976 kubelet[1452]: W1213 01:49:13.760968 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.760976 kubelet[1452]: E1213 01:49:13.760977 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.761182 kubelet[1452]: E1213 01:49:13.761154 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.761182 kubelet[1452]: W1213 01:49:13.761174 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.761182 kubelet[1452]: E1213 01:49:13.761184 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.761365 kubelet[1452]: E1213 01:49:13.761347 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.761365 kubelet[1452]: W1213 01:49:13.761358 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.761365 kubelet[1452]: E1213 01:49:13.761367 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.761523 kubelet[1452]: E1213 01:49:13.761508 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.761523 kubelet[1452]: W1213 01:49:13.761518 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.761592 kubelet[1452]: E1213 01:49:13.761526 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.761669 kubelet[1452]: E1213 01:49:13.761656 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.761669 kubelet[1452]: W1213 01:49:13.761666 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.761721 kubelet[1452]: E1213 01:49:13.761675 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.761849 kubelet[1452]: E1213 01:49:13.761837 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.761849 kubelet[1452]: W1213 01:49:13.761846 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.761898 kubelet[1452]: E1213 01:49:13.761855 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.762020 kubelet[1452]: E1213 01:49:13.762004 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.762020 kubelet[1452]: W1213 01:49:13.762014 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.762110 kubelet[1452]: E1213 01:49:13.762026 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.762167 kubelet[1452]: E1213 01:49:13.762154 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.762167 kubelet[1452]: W1213 01:49:13.762164 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.762213 kubelet[1452]: E1213 01:49:13.762173 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.762337 kubelet[1452]: E1213 01:49:13.762326 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.762337 kubelet[1452]: W1213 01:49:13.762335 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.762389 kubelet[1452]: E1213 01:49:13.762344 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.762524 kubelet[1452]: E1213 01:49:13.762511 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.762524 kubelet[1452]: W1213 01:49:13.762521 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.762570 kubelet[1452]: E1213 01:49:13.762530 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.762703 kubelet[1452]: E1213 01:49:13.762690 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.762703 kubelet[1452]: W1213 01:49:13.762699 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.762775 kubelet[1452]: E1213 01:49:13.762708 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.762873 kubelet[1452]: E1213 01:49:13.762858 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.762873 kubelet[1452]: W1213 01:49:13.762868 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.762873 kubelet[1452]: E1213 01:49:13.762876 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.763044 kubelet[1452]: E1213 01:49:13.763032 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.763044 kubelet[1452]: W1213 01:49:13.763041 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.763095 kubelet[1452]: E1213 01:49:13.763051 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.763226 kubelet[1452]: E1213 01:49:13.763214 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.763226 kubelet[1452]: W1213 01:49:13.763223 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.763273 kubelet[1452]: E1213 01:49:13.763232 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.763386 kubelet[1452]: E1213 01:49:13.763374 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.763386 kubelet[1452]: W1213 01:49:13.763383 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.763433 kubelet[1452]: E1213 01:49:13.763392 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.763545 kubelet[1452]: E1213 01:49:13.763532 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.763545 kubelet[1452]: W1213 01:49:13.763542 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.763602 kubelet[1452]: E1213 01:49:13.763553 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.763695 kubelet[1452]: E1213 01:49:13.763683 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.763695 kubelet[1452]: W1213 01:49:13.763692 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.763739 kubelet[1452]: E1213 01:49:13.763701 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.763857 kubelet[1452]: E1213 01:49:13.763843 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.763857 kubelet[1452]: W1213 01:49:13.763853 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.763921 kubelet[1452]: E1213 01:49:13.763861 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.765171 kubelet[1452]: E1213 01:49:13.765144 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.765171 kubelet[1452]: W1213 01:49:13.765158 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.765171 kubelet[1452]: E1213 01:49:13.765172 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.765384 kubelet[1452]: E1213 01:49:13.765362 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.765384 kubelet[1452]: W1213 01:49:13.765374 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.765445 kubelet[1452]: E1213 01:49:13.765393 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.765649 kubelet[1452]: E1213 01:49:13.765633 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.765649 kubelet[1452]: W1213 01:49:13.765644 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.765717 kubelet[1452]: E1213 01:49:13.765661 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.765902 kubelet[1452]: E1213 01:49:13.765871 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.765902 kubelet[1452]: W1213 01:49:13.765895 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.766018 kubelet[1452]: E1213 01:49:13.765927 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.766213 kubelet[1452]: E1213 01:49:13.766192 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.766213 kubelet[1452]: W1213 01:49:13.766211 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.766296 kubelet[1452]: E1213 01:49:13.766234 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.766522 kubelet[1452]: E1213 01:49:13.766472 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.766522 kubelet[1452]: W1213 01:49:13.766504 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.766584 kubelet[1452]: E1213 01:49:13.766539 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.766757 kubelet[1452]: E1213 01:49:13.766738 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.766757 kubelet[1452]: W1213 01:49:13.766757 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.766846 kubelet[1452]: E1213 01:49:13.766779 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.767005 kubelet[1452]: E1213 01:49:13.766981 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.767052 kubelet[1452]: W1213 01:49:13.767015 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.767052 kubelet[1452]: E1213 01:49:13.767039 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.767298 kubelet[1452]: E1213 01:49:13.767278 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.767298 kubelet[1452]: W1213 01:49:13.767296 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.767366 kubelet[1452]: E1213 01:49:13.767327 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.767583 kubelet[1452]: E1213 01:49:13.767561 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.767583 kubelet[1452]: W1213 01:49:13.767576 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.767659 kubelet[1452]: E1213 01:49:13.767599 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.767846 kubelet[1452]: E1213 01:49:13.767829 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.767846 kubelet[1452]: W1213 01:49:13.767842 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.767913 kubelet[1452]: E1213 01:49:13.767860 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.768067 kubelet[1452]: E1213 01:49:13.768047 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:13.768121 kubelet[1452]: W1213 01:49:13.768065 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:13.768121 kubelet[1452]: E1213 01:49:13.768089 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:13.918391 kubelet[1452]: E1213 01:49:13.918338 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:14.669046 kubelet[1452]: E1213 01:49:14.669012 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:14.669557 kubelet[1452]: E1213 01:49:14.669544 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.669557 kubelet[1452]: W1213 01:49:14.669556 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.669647 kubelet[1452]: E1213 01:49:14.669575 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.669821 kubelet[1452]: E1213 01:49:14.669808 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.669821 kubelet[1452]: W1213 01:49:14.669817 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.669904 kubelet[1452]: E1213 01:49:14.669827 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.670000 kubelet[1452]: E1213 01:49:14.669978 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.670000 kubelet[1452]: W1213 01:49:14.669985 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.670044 kubelet[1452]: E1213 01:49:14.670007 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.670174 kubelet[1452]: E1213 01:49:14.670158 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.670174 kubelet[1452]: W1213 01:49:14.670167 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.670228 kubelet[1452]: E1213 01:49:14.670179 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.670370 kubelet[1452]: E1213 01:49:14.670348 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.670370 kubelet[1452]: W1213 01:49:14.670359 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.670443 kubelet[1452]: E1213 01:49:14.670372 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.670559 kubelet[1452]: E1213 01:49:14.670544 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.670559 kubelet[1452]: W1213 01:49:14.670554 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.670637 kubelet[1452]: E1213 01:49:14.670565 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.670779 kubelet[1452]: E1213 01:49:14.670768 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.670779 kubelet[1452]: W1213 01:49:14.670777 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.670828 kubelet[1452]: E1213 01:49:14.670788 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.671011 kubelet[1452]: E1213 01:49:14.670984 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.671011 kubelet[1452]: W1213 01:49:14.671010 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.671088 kubelet[1452]: E1213 01:49:14.671023 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.671198 kubelet[1452]: E1213 01:49:14.671188 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.671198 kubelet[1452]: W1213 01:49:14.671196 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.671241 kubelet[1452]: E1213 01:49:14.671204 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.671354 kubelet[1452]: E1213 01:49:14.671341 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.671354 kubelet[1452]: W1213 01:49:14.671348 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.671419 kubelet[1452]: E1213 01:49:14.671362 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.671542 kubelet[1452]: E1213 01:49:14.671530 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.671542 kubelet[1452]: W1213 01:49:14.671537 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.671607 kubelet[1452]: E1213 01:49:14.671546 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.671708 kubelet[1452]: E1213 01:49:14.671696 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.671708 kubelet[1452]: W1213 01:49:14.671703 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.671769 kubelet[1452]: E1213 01:49:14.671712 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.671894 kubelet[1452]: E1213 01:49:14.671882 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.671894 kubelet[1452]: W1213 01:49:14.671889 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.671958 kubelet[1452]: E1213 01:49:14.671898 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.672064 kubelet[1452]: E1213 01:49:14.672054 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.672064 kubelet[1452]: W1213 01:49:14.672062 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.672123 kubelet[1452]: E1213 01:49:14.672071 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.672236 kubelet[1452]: E1213 01:49:14.672228 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.672258 kubelet[1452]: W1213 01:49:14.672235 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.672258 kubelet[1452]: E1213 01:49:14.672245 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.672406 kubelet[1452]: E1213 01:49:14.672396 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.672406 kubelet[1452]: W1213 01:49:14.672404 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.672466 kubelet[1452]: E1213 01:49:14.672444 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.672637 kubelet[1452]: E1213 01:49:14.672628 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.672660 kubelet[1452]: W1213 01:49:14.672636 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.672660 kubelet[1452]: E1213 01:49:14.672645 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.672793 kubelet[1452]: E1213 01:49:14.672784 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.672793 kubelet[1452]: W1213 01:49:14.672791 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.672842 kubelet[1452]: E1213 01:49:14.672800 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.672949 kubelet[1452]: E1213 01:49:14.672939 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.672949 kubelet[1452]: W1213 01:49:14.672947 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.673009 kubelet[1452]: E1213 01:49:14.672955 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.673111 kubelet[1452]: E1213 01:49:14.673100 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.673111 kubelet[1452]: W1213 01:49:14.673107 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.673173 kubelet[1452]: E1213 01:49:14.673116 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.673300 kubelet[1452]: E1213 01:49:14.673289 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.673300 kubelet[1452]: W1213 01:49:14.673296 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.673364 kubelet[1452]: E1213 01:49:14.673306 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.673520 kubelet[1452]: E1213 01:49:14.673503 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.673520 kubelet[1452]: W1213 01:49:14.673518 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.673601 kubelet[1452]: E1213 01:49:14.673540 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.673766 kubelet[1452]: E1213 01:49:14.673752 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.673766 kubelet[1452]: W1213 01:49:14.673763 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.673862 kubelet[1452]: E1213 01:49:14.673782 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.673973 kubelet[1452]: E1213 01:49:14.673960 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.673973 kubelet[1452]: W1213 01:49:14.673971 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.674034 kubelet[1452]: E1213 01:49:14.674003 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.674187 kubelet[1452]: E1213 01:49:14.674178 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.674187 kubelet[1452]: W1213 01:49:14.674185 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.674235 kubelet[1452]: E1213 01:49:14.674199 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.674370 kubelet[1452]: E1213 01:49:14.674361 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.674394 kubelet[1452]: W1213 01:49:14.674371 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.674394 kubelet[1452]: E1213 01:49:14.674390 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.674689 kubelet[1452]: E1213 01:49:14.674665 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.674689 kubelet[1452]: W1213 01:49:14.674687 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.674764 kubelet[1452]: E1213 01:49:14.674716 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.674876 kubelet[1452]: E1213 01:49:14.674860 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.674876 kubelet[1452]: W1213 01:49:14.674872 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.674943 kubelet[1452]: E1213 01:49:14.674888 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.675051 kubelet[1452]: E1213 01:49:14.675038 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.675051 kubelet[1452]: W1213 01:49:14.675050 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.675107 kubelet[1452]: E1213 01:49:14.675067 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.675228 kubelet[1452]: E1213 01:49:14.675215 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.675228 kubelet[1452]: W1213 01:49:14.675226 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.675276 kubelet[1452]: E1213 01:49:14.675242 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.675498 kubelet[1452]: E1213 01:49:14.675480 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.675498 kubelet[1452]: W1213 01:49:14.675493 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.675572 kubelet[1452]: E1213 01:49:14.675510 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.675686 kubelet[1452]: E1213 01:49:14.675673 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:14.675686 kubelet[1452]: W1213 01:49:14.675682 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:14.675732 kubelet[1452]: E1213 01:49:14.675691 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:14.918855 kubelet[1452]: E1213 01:49:14.918800 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:15.658563 kubelet[1452]: E1213 01:49:15.657751 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:15.685949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3718574319.mount: Deactivated successfully. Dec 13 01:49:15.856097 env[1199]: time="2024-12-13T01:49:15.856019791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:15.859130 env[1199]: time="2024-12-13T01:49:15.859068270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:15.860949 env[1199]: time="2024-12-13T01:49:15.860891960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:15.865929 env[1199]: time="2024-12-13T01:49:15.865836445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:15.866375 env[1199]: time="2024-12-13T01:49:15.866305915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:49:15.869830 env[1199]: time="2024-12-13T01:49:15.869741339Z" level=info msg="CreateContainer within sandbox \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:49:15.919717 kubelet[1452]: E1213 01:49:15.919596 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:15.933876 env[1199]: time="2024-12-13T01:49:15.933838788Z" level=info msg="CreateContainer within sandbox \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768\"" Dec 13 01:49:15.934530 env[1199]: time="2024-12-13T01:49:15.934484779Z" level=info msg="StartContainer for \"0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768\"" Dec 13 01:49:15.964569 systemd[1]: Started cri-containerd-0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768.scope. Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f99de7d5c28 items=0 ppid=1515 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:15.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039303564393838393636666134646137613564313039646637396363 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit: BPF prog-id=66 op=LOAD Dec 13 01:49:15.995000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b6b98 items=0 ppid=1515 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:15.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039303564393838393636666134646137613564313039646637396363 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.995000 audit: BPF prog-id=67 op=LOAD Dec 13 01:49:15.995000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b6be8 items=0 ppid=1515 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:15.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039303564393838393636666134646137613564313039646637396363 Dec 13 01:49:15.997000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:49:15.997000 audit: BPF prog-id=66 op=UNLOAD Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:15.997000 audit: BPF prog-id=68 op=LOAD Dec 13 01:49:15.997000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b6c78 items=0 ppid=1515 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:15.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039303564393838393636666134646137613564313039646637396363 Dec 13 01:49:16.015813 env[1199]: time="2024-12-13T01:49:16.015749018Z" level=info msg="StartContainer for \"0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768\" returns successfully" Dec 13 01:49:16.032727 systemd[1]: cri-containerd-0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768.scope: Deactivated successfully. Dec 13 01:49:16.037000 audit: BPF prog-id=68 op=UNLOAD Dec 13 01:49:16.641074 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768-rootfs.mount: Deactivated successfully. Dec 13 01:49:16.673472 kubelet[1452]: E1213 01:49:16.673345 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:16.769537 env[1199]: time="2024-12-13T01:49:16.769443724Z" level=info msg="shim disconnected" id=0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768 Dec 13 01:49:16.769537 env[1199]: time="2024-12-13T01:49:16.769531488Z" level=warning msg="cleaning up after shim disconnected" id=0905d988966fa4da7a5d109df79cc7ee3c5af51ea270b5a6ce95d0796e556768 namespace=k8s.io Dec 13 01:49:16.769537 env[1199]: time="2024-12-13T01:49:16.769545745Z" level=info msg="cleaning up dead shim" Dec 13 01:49:16.780092 env[1199]: time="2024-12-13T01:49:16.780042394Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1862 runtime=io.containerd.runc.v2\n" Dec 13 01:49:16.920010 kubelet[1452]: E1213 01:49:16.919860 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:17.657451 kubelet[1452]: E1213 01:49:17.657413 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:17.675883 kubelet[1452]: E1213 01:49:17.675857 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:17.676480 env[1199]: time="2024-12-13T01:49:17.676447083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:49:17.920555 kubelet[1452]: E1213 01:49:17.920436 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:18.921415 kubelet[1452]: E1213 01:49:18.921374 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:19.657814 kubelet[1452]: E1213 01:49:19.657763 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:19.922184 kubelet[1452]: E1213 01:49:19.922059 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:20.922790 kubelet[1452]: E1213 01:49:20.922749 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:21.658082 kubelet[1452]: E1213 01:49:21.658028 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:21.923567 kubelet[1452]: E1213 01:49:21.923439 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:22.923978 kubelet[1452]: E1213 01:49:22.923890 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:23.658191 kubelet[1452]: E1213 01:49:23.658089 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:23.924145 kubelet[1452]: E1213 01:49:23.924011 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:24.924639 kubelet[1452]: E1213 01:49:24.924565 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:25.621829 env[1199]: time="2024-12-13T01:49:25.621772823Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:25.623601 env[1199]: time="2024-12-13T01:49:25.623556569Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:25.625116 env[1199]: time="2024-12-13T01:49:25.625061752Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:25.626578 env[1199]: time="2024-12-13T01:49:25.626539444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:25.627058 env[1199]: time="2024-12-13T01:49:25.627030415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:49:25.628700 env[1199]: time="2024-12-13T01:49:25.628669800Z" level=info msg="CreateContainer within sandbox \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:49:25.644471 env[1199]: time="2024-12-13T01:49:25.644421275Z" level=info msg="CreateContainer within sandbox \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb\"" Dec 13 01:49:25.644934 env[1199]: time="2024-12-13T01:49:25.644899542Z" level=info msg="StartContainer for \"10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb\"" Dec 13 01:49:25.658678 kubelet[1452]: E1213 01:49:25.658628 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:25.662388 systemd[1]: Started cri-containerd-10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb.scope. Dec 13 01:49:25.674476 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 01:49:25.674596 kernel: audit: type=1400 audit(1734054565.672:513): avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f91e00a02f8 items=0 ppid=1515 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.682405 kernel: audit: type=1300 audit(1734054565.672:513): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f91e00a02f8 items=0 ppid=1515 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666364313661656364366334626561666236313464313861393733 Dec 13 01:49:25.686909 kernel: audit: type=1327 audit(1734054565.672:513): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666364313661656364366334626561666236313464313861393733 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.690357 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.693800 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.693858 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.699825 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.702954 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.709213 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.709287 kernel: audit: type=1400 audit(1734054565.672:514): avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.672000 audit: BPF prog-id=69 op=LOAD Dec 13 01:49:25.672000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024408 items=0 ppid=1515 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666364313661656364366334626561666236313464313861393733 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.676000 audit: BPF prog-id=70 op=LOAD Dec 13 01:49:25.676000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024458 items=0 ppid=1515 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666364313661656364366334626561666236313464313861393733 Dec 13 01:49:25.681000 audit: BPF prog-id=70 op=UNLOAD Dec 13 01:49:25.681000 audit: BPF prog-id=69 op=UNLOAD Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:25.681000 audit: BPF prog-id=71 op=LOAD Dec 13 01:49:25.681000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000244e8 items=0 ppid=1515 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666364313661656364366334626561666236313464313861393733 Dec 13 01:49:25.710443 env[1199]: time="2024-12-13T01:49:25.710389342Z" level=info msg="StartContainer for \"10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb\" returns successfully" Dec 13 01:49:25.925733 kubelet[1452]: E1213 01:49:25.925609 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:26.623466 systemd[1]: cri-containerd-10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb.scope: Deactivated successfully. Dec 13 01:49:26.627000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:49:26.638144 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb-rootfs.mount: Deactivated successfully. Dec 13 01:49:26.698019 kubelet[1452]: E1213 01:49:26.697970 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:26.725292 kubelet[1452]: I1213 01:49:26.724596 1452 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 01:49:26.926685 kubelet[1452]: E1213 01:49:26.926526 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:27.395635 env[1199]: time="2024-12-13T01:49:27.395545443Z" level=info msg="shim disconnected" id=10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb Dec 13 01:49:27.395635 env[1199]: time="2024-12-13T01:49:27.395610315Z" level=warning msg="cleaning up after shim disconnected" id=10fcd16aecd6c4beafb614d18a973e72b15dd4f41bdd3632c8b481756172bfeb namespace=k8s.io Dec 13 01:49:27.395635 env[1199]: time="2024-12-13T01:49:27.395622558Z" level=info msg="cleaning up dead shim" Dec 13 01:49:27.402396 env[1199]: time="2024-12-13T01:49:27.402341370Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1922 runtime=io.containerd.runc.v2\n" Dec 13 01:49:27.662316 systemd[1]: Created slice kubepods-besteffort-pod31dbc540_8737_4500_8869_4ca48099a8a8.slice. Dec 13 01:49:27.664643 env[1199]: time="2024-12-13T01:49:27.664606415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66jmt,Uid:31dbc540-8737-4500-8869-4ca48099a8a8,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:27.701309 kubelet[1452]: E1213 01:49:27.701270 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:27.701922 env[1199]: time="2024-12-13T01:49:27.701878657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:49:27.724938 env[1199]: time="2024-12-13T01:49:27.724843071Z" level=error msg="Failed to destroy network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:27.725410 env[1199]: time="2024-12-13T01:49:27.725364800Z" level=error msg="encountered an error cleaning up failed sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:27.725460 env[1199]: time="2024-12-13T01:49:27.725432818Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66jmt,Uid:31dbc540-8737-4500-8869-4ca48099a8a8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:27.725795 kubelet[1452]: E1213 01:49:27.725734 1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:27.725795 kubelet[1452]: E1213 01:49:27.725807 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:27.726107 kubelet[1452]: E1213 01:49:27.725830 1452 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-66jmt" Dec 13 01:49:27.726107 kubelet[1452]: E1213 01:49:27.725895 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-66jmt_calico-system(31dbc540-8737-4500-8869-4ca48099a8a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-66jmt_calico-system(31dbc540-8737-4500-8869-4ca48099a8a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:27.726572 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807-shm.mount: Deactivated successfully. Dec 13 01:49:27.927199 kubelet[1452]: E1213 01:49:27.927049 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:28.703386 kubelet[1452]: I1213 01:49:28.703349 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:49:28.704055 env[1199]: time="2024-12-13T01:49:28.704011411Z" level=info msg="StopPodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\"" Dec 13 01:49:28.725361 env[1199]: time="2024-12-13T01:49:28.725291707Z" level=error msg="StopPodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" failed" error="failed to destroy network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:28.725702 kubelet[1452]: E1213 01:49:28.725641 1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:49:28.725776 kubelet[1452]: E1213 01:49:28.725749 1452 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807"} Dec 13 01:49:28.725813 kubelet[1452]: E1213 01:49:28.725801 1452 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31dbc540-8737-4500-8869-4ca48099a8a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:28.725881 kubelet[1452]: E1213 01:49:28.725839 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31dbc540-8737-4500-8869-4ca48099a8a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-66jmt" podUID="31dbc540-8737-4500-8869-4ca48099a8a8" Dec 13 01:49:28.915561 kubelet[1452]: E1213 01:49:28.915503 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:28.927729 kubelet[1452]: E1213 01:49:28.927661 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:29.927851 kubelet[1452]: E1213 01:49:29.927802 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:30.928925 kubelet[1452]: E1213 01:49:30.928850 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:31.482094 kubelet[1452]: I1213 01:49:31.482042 1452 topology_manager.go:215] "Topology Admit Handler" podUID="5a3092c7-6974-473f-acaf-d6b57453ae33" podNamespace="default" podName="nginx-deployment-6d5f899847-ffs7j" Dec 13 01:49:31.486916 systemd[1]: Created slice kubepods-besteffort-pod5a3092c7_6974_473f_acaf_d6b57453ae33.slice. Dec 13 01:49:31.613053 kubelet[1452]: I1213 01:49:31.612967 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qh8cg\" (UniqueName: \"kubernetes.io/projected/5a3092c7-6974-473f-acaf-d6b57453ae33-kube-api-access-qh8cg\") pod \"nginx-deployment-6d5f899847-ffs7j\" (UID: \"5a3092c7-6974-473f-acaf-d6b57453ae33\") " pod="default/nginx-deployment-6d5f899847-ffs7j" Dec 13 01:49:31.789920 env[1199]: time="2024-12-13T01:49:31.789780582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ffs7j,Uid:5a3092c7-6974-473f-acaf-d6b57453ae33,Namespace:default,Attempt:0,}" Dec 13 01:49:31.856102 env[1199]: time="2024-12-13T01:49:31.856007876Z" level=error msg="Failed to destroy network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:31.857850 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37-shm.mount: Deactivated successfully. Dec 13 01:49:31.858479 env[1199]: time="2024-12-13T01:49:31.858339499Z" level=error msg="encountered an error cleaning up failed sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:31.858479 env[1199]: time="2024-12-13T01:49:31.858414861Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ffs7j,Uid:5a3092c7-6974-473f-acaf-d6b57453ae33,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:31.858941 kubelet[1452]: E1213 01:49:31.858890 1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:31.859037 kubelet[1452]: E1213 01:49:31.858960 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ffs7j" Dec 13 01:49:31.859037 kubelet[1452]: E1213 01:49:31.859011 1452 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ffs7j" Dec 13 01:49:31.859101 kubelet[1452]: E1213 01:49:31.859078 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-ffs7j_default(5a3092c7-6974-473f-acaf-d6b57453ae33)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-ffs7j_default(5a3092c7-6974-473f-acaf-d6b57453ae33)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ffs7j" podUID="5a3092c7-6974-473f-acaf-d6b57453ae33" Dec 13 01:49:31.930123 kubelet[1452]: E1213 01:49:31.930050 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:32.710762 kubelet[1452]: I1213 01:49:32.710727 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:49:32.711379 env[1199]: time="2024-12-13T01:49:32.711329835Z" level=info msg="StopPodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\"" Dec 13 01:49:32.732921 env[1199]: time="2024-12-13T01:49:32.732860721Z" level=error msg="StopPodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" failed" error="failed to destroy network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:32.733193 kubelet[1452]: E1213 01:49:32.733164 1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:49:32.733250 kubelet[1452]: E1213 01:49:32.733220 1452 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37"} Dec 13 01:49:32.733276 kubelet[1452]: E1213 01:49:32.733255 1452 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5a3092c7-6974-473f-acaf-d6b57453ae33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:32.733341 kubelet[1452]: E1213 01:49:32.733285 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5a3092c7-6974-473f-acaf-d6b57453ae33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ffs7j" podUID="5a3092c7-6974-473f-acaf-d6b57453ae33" Dec 13 01:49:32.930359 kubelet[1452]: E1213 01:49:32.930306 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:33.931079 kubelet[1452]: E1213 01:49:33.930978 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:34.412062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2450971846.mount: Deactivated successfully. Dec 13 01:49:34.932100 kubelet[1452]: E1213 01:49:34.932032 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:35.760217 env[1199]: time="2024-12-13T01:49:35.760152632Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.762161 env[1199]: time="2024-12-13T01:49:35.762118727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.763595 env[1199]: time="2024-12-13T01:49:35.763519884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.764738 env[1199]: time="2024-12-13T01:49:35.764702239Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.765038 env[1199]: time="2024-12-13T01:49:35.765010102Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:49:35.771413 env[1199]: time="2024-12-13T01:49:35.771367328Z" level=info msg="CreateContainer within sandbox \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:49:35.788009 env[1199]: time="2024-12-13T01:49:35.787935888Z" level=info msg="CreateContainer within sandbox \"e22ed690338ad7b122ab720b45c17eb49ead032d5abb503fb0e507d22c561cf9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f86eecff4c5bce09f769f4b5fc2cdfba8a0a8ad4bad03e9662779bcb13514431\"" Dec 13 01:49:35.788458 env[1199]: time="2024-12-13T01:49:35.788432604Z" level=info msg="StartContainer for \"f86eecff4c5bce09f769f4b5fc2cdfba8a0a8ad4bad03e9662779bcb13514431\"" Dec 13 01:49:35.802587 systemd[1]: Started cri-containerd-f86eecff4c5bce09f769f4b5fc2cdfba8a0a8ad4bad03e9662779bcb13514431.scope. Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.820419 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 01:49:35.820483 kernel: audit: type=1400 audit(1734054575.818:520): avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fabf31207c8 items=0 ppid=1515 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.828465 kernel: audit: type=1300 audit(1734054575.818:520): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fabf31207c8 items=0 ppid=1515 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.828516 kernel: audit: type=1327 audit(1734054575.818:520): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366565636666346335626365303966373639663462356663326364 Dec 13 01:49:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366565636666346335626365303966373639663462356663326364 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.835692 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.835740 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.841963 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.842027 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.845279 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.848685 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.849783 env[1199]: time="2024-12-13T01:49:35.849742810Z" level=info msg="StartContainer for \"f86eecff4c5bce09f769f4b5fc2cdfba8a0a8ad4bad03e9662779bcb13514431\" returns successfully" Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.855250 kernel: audit: type=1400 audit(1734054575.818:521): avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.818000 audit: BPF prog-id=72 op=LOAD Dec 13 01:49:35.818000 audit[2069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032fbd8 items=0 ppid=1515 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366565636666346335626365303966373639663462356663326364 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.822000 audit: BPF prog-id=73 op=LOAD Dec 13 01:49:35.822000 audit[2069]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032fc28 items=0 ppid=1515 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366565636666346335626365303966373639663462356663326364 Dec 13 01:49:35.827000 audit: BPF prog-id=73 op=UNLOAD Dec 13 01:49:35.827000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { perfmon } for pid=2069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit[2069]: AVC avc: denied { bpf } for pid=2069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.827000 audit: BPF prog-id=74 op=LOAD Dec 13 01:49:35.827000 audit[2069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032fcb8 items=0 ppid=1515 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366565636666346335626365303966373639663462356663326364 Dec 13 01:49:35.917574 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:49:35.917671 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:49:35.932868 kubelet[1452]: E1213 01:49:35.932838 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:36.721075 kubelet[1452]: E1213 01:49:36.719255 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:36.933427 kubelet[1452]: E1213 01:49:36.933374 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:37.108000 audit[2164]: AVC avc: denied { write } for pid=2164 comm="tee" name="fd" dev="proc" ino=18928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.108000 audit[2164]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfa45ca2a a2=241 a3=1b6 items=1 ppid=2140 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.108000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:49:37.108000 audit: PATH item=0 name="/dev/fd/63" inode=18922 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.108000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.110000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=19925 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.110000 audit[2168]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd90fc7a1a a2=241 a3=1b6 items=1 ppid=2150 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.110000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:49:37.110000 audit: PATH item=0 name="/dev/fd/63" inode=18925 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.110000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.116000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=18936 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.116000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1323ca2a a2=241 a3=1b6 items=1 ppid=2145 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.116000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:49:37.116000 audit: PATH item=0 name="/dev/fd/63" inode=19922 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.116000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.116000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=20700 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.116000 audit[2180]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff30da4a2b a2=241 a3=1b6 items=1 ppid=2138 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.121000 audit[2189]: AVC avc: denied { write } for pid=2189 comm="tee" name="fd" dev="proc" ino=20705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.116000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:49:37.116000 audit: PATH item=0 name="/dev/fd/63" inode=19927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.116000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.121000 audit[2189]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecb849a2c a2=241 a3=1b6 items=1 ppid=2139 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.121000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:49:37.121000 audit: PATH item=0 name="/dev/fd/63" inode=20695 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.121000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.165000 audit[2212]: AVC avc: denied { write } for pid=2212 comm="tee" name="fd" dev="proc" ino=18947 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.165000 audit[2214]: AVC avc: denied { write } for pid=2214 comm="tee" name="fd" dev="proc" ino=18948 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.165000 audit[2212]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee595fa1b a2=241 a3=1b6 items=1 ppid=2148 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.165000 audit[2214]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4fa5ca2a a2=241 a3=1b6 items=1 ppid=2160 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.165000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:49:37.165000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:49:37.165000 audit: PATH item=0 name="/dev/fd/63" inode=19931 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.165000 audit: PATH item=0 name="/dev/fd/63" inode=18942 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.165000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.165000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.298000 audit: BPF prog-id=75 op=LOAD Dec 13 01:49:37.298000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff16914110 a2=98 a3=3 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.298000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.298000 audit: BPF prog-id=75 op=UNLOAD Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit: BPF prog-id=76 op=LOAD Dec 13 01:49:37.299000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff16913ef0 a2=74 a3=540051 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.299000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.299000 audit: BPF prog-id=77 op=LOAD Dec 13 01:49:37.299000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff16913f20 a2=94 a3=2 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.299000 audit: BPF prog-id=77 op=UNLOAD Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit: BPF prog-id=78 op=LOAD Dec 13 01:49:37.409000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff16913de0 a2=40 a3=1 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.409000 audit: BPF prog-id=78 op=UNLOAD Dec 13 01:49:37.409000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.409000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff16913eb0 a2=50 a3=7fff16913f90 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff16913df0 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff16913e20 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff16913d30 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff16913e40 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff16913e20 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff16913e10 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff16913e40 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff16913e20 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff16913e40 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff16913e10 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.417000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.417000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff16913e80 a2=28 a3=0 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff16913c30 a2=50 a3=1 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit: BPF prog-id=79 op=LOAD Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff16913c30 a2=94 a3=5 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit: BPF prog-id=79 op=UNLOAD Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff16913ce0 a2=50 a3=1 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff16913e00 a2=4 a3=38 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { confidentiality } for pid=2253 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff16913e50 a2=94 a3=6 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { confidentiality } for pid=2253 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff16913600 a2=94 a3=83 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.418000 audit[2253]: AVC avc: denied { confidentiality } for pid=2253 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.418000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff16913600 a2=94 a3=83 items=0 ppid=2147 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.424000 audit: BPF prog-id=80 op=LOAD Dec 13 01:49:37.424000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8ad82260 a2=98 a3=1999999999999999 items=0 ppid=2147 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.424000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:37.425000 audit: BPF prog-id=80 op=UNLOAD Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit: BPF prog-id=81 op=LOAD Dec 13 01:49:37.425000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8ad82140 a2=74 a3=ffff items=0 ppid=2147 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.425000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:37.425000 audit: BPF prog-id=81 op=UNLOAD Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.425000 audit: BPF prog-id=82 op=LOAD Dec 13 01:49:37.425000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8ad82180 a2=40 a3=7ffd8ad82360 items=0 ppid=2147 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.425000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:37.425000 audit: BPF prog-id=82 op=UNLOAD Dec 13 01:49:37.461677 systemd-networkd[1028]: vxlan.calico: Link UP Dec 13 01:49:37.461687 systemd-networkd[1028]: vxlan.calico: Gained carrier Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit: BPF prog-id=83 op=LOAD Dec 13 01:49:37.474000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ff22580 a2=98 a3=ffffffff items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.474000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.474000 audit: BPF prog-id=83 op=UNLOAD Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.474000 audit: BPF prog-id=84 op=LOAD Dec 13 01:49:37.474000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ff22390 a2=74 a3=540051 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.474000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit: BPF prog-id=84 op=UNLOAD Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit: BPF prog-id=85 op=LOAD Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ff223c0 a2=94 a3=2 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit: BPF prog-id=85 op=UNLOAD Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ff22290 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ff222c0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ff221d0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ff222e0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ff222c0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ff222b0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ff222e0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ff222c0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ff222e0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ff222b0 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ff22320 a2=28 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit: BPF prog-id=86 op=LOAD Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5ff22190 a2=40 a3=0 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.475000 audit: BPF prog-id=86 op=UNLOAD Dec 13 01:49:37.475000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.475000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff5ff22180 a2=50 a3=2800 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff5ff22180 a2=50 a3=2800 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit: BPF prog-id=87 op=LOAD Dec 13 01:49:37.476000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5ff219a0 a2=94 a3=2 items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.476000 audit: BPF prog-id=87 op=UNLOAD Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.476000 audit: BPF prog-id=88 op=LOAD Dec 13 01:49:37.476000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5ff21aa0 a2=94 a3=2d items=0 ppid=2147 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.480000 audit: BPF prog-id=89 op=LOAD Dec 13 01:49:37.480000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8cfafb60 a2=98 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.480000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.480000 audit: BPF prog-id=89 op=UNLOAD Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit: BPF prog-id=90 op=LOAD Dec 13 01:49:37.481000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff8cfaf940 a2=74 a3=540051 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.481000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.481000 audit: BPF prog-id=90 op=UNLOAD Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.481000 audit: BPF prog-id=91 op=LOAD Dec 13 01:49:37.481000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff8cfaf970 a2=94 a3=2 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.481000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.481000 audit: BPF prog-id=91 op=UNLOAD Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit: BPF prog-id=92 op=LOAD Dec 13 01:49:37.625000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff8cfaf830 a2=40 a3=1 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.625000 audit: BPF prog-id=92 op=UNLOAD Dec 13 01:49:37.625000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.625000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff8cfaf900 a2=50 a3=7fff8cfaf9e0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8cfaf840 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8cfaf870 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8cfaf780 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8cfaf890 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8cfaf870 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8cfaf860 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8cfaf890 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8cfaf870 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8cfaf890 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8cfaf860 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff8cfaf8d0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff8cfaf680 a2=50 a3=1 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.633000 audit: BPF prog-id=93 op=LOAD Dec 13 01:49:37.633000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8cfaf680 a2=94 a3=5 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.633000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit: BPF prog-id=93 op=UNLOAD Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff8cfaf730 a2=50 a3=1 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff8cfaf850 a2=4 a3=38 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { confidentiality } for pid=2292 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff8cfaf8a0 a2=94 a3=6 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { confidentiality } for pid=2292 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff8cfaf050 a2=94 a3=83 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { confidentiality } for pid=2292 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff8cfaf050 a2=94 a3=83 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8cfb0a90 a2=10 a3=208 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8cfb0930 a2=10 a3=3 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8cfb08d0 a2=10 a3=3 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.634000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.634000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8cfb08d0 a2=10 a3=7 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.643000 audit: BPF prog-id=88 op=UNLOAD Dec 13 01:49:37.685000 audit[2317]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.685000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffef25d89c0 a2=0 a3=7ffef25d89ac items=0 ppid=2147 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.685000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.696000 audit[2316]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.696000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeb8298180 a2=0 a3=7ffeb829816c items=0 ppid=2147 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.696000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.696000 audit[2315]: NETFILTER_CFG table=raw:67 family=2 entries=21 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.696000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffc4778d60 a2=0 a3=7fffc4778d4c items=0 ppid=2147 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.696000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.698000 audit[2320]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.698000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd98a9b770 a2=0 a3=7ffd98a9b75c items=0 ppid=2147 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.698000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.720199 kubelet[1452]: I1213 01:49:37.720171 1452 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:37.720883 kubelet[1452]: E1213 01:49:37.720856 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:37.892000 audit[2326]: NETFILTER_CFG table=filter:69 family=2 entries=16 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.892000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffddc1b8530 a2=0 a3=7ffddc1b851c items=0 ppid=1604 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.898000 audit[2326]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.898000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffddc1b8530 a2=0 a3=0 items=0 ppid=1604 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.909000 audit[2328]: NETFILTER_CFG table=filter:71 family=2 entries=13 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.909000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdd9a1beb0 a2=0 a3=7ffdd9a1be9c items=0 ppid=1604 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.913000 audit[2328]: NETFILTER_CFG table=nat:72 family=2 entries=35 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.913000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdd9a1beb0 a2=0 a3=7ffdd9a1be9c items=0 ppid=1604 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.933846 kubelet[1452]: E1213 01:49:37.933813 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:38.656229 systemd-networkd[1028]: vxlan.calico: Gained IPv6LL Dec 13 01:49:38.723236 kubelet[1452]: E1213 01:49:38.723197 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:38.935135 kubelet[1452]: E1213 01:49:38.934963 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:39.936231 kubelet[1452]: E1213 01:49:39.936173 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:40.658132 env[1199]: time="2024-12-13T01:49:40.658078222Z" level=info msg="StopPodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\"" Dec 13 01:49:40.776817 kubelet[1452]: I1213 01:49:40.776776 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-kp46c" podStartSLOduration=6.982959021 podStartE2EDuration="31.77672938s" podCreationTimestamp="2024-12-13 01:49:09 +0000 UTC" firstStartedPulling="2024-12-13 01:49:10.971406223 +0000 UTC m=+2.555437592" lastFinishedPulling="2024-12-13 01:49:35.765176582 +0000 UTC m=+27.349207951" observedRunningTime="2024-12-13 01:49:36.729529627 +0000 UTC m=+28.313560996" watchObservedRunningTime="2024-12-13 01:49:40.77672938 +0000 UTC m=+32.360760750" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.776 [INFO][2418] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.776 [INFO][2418] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" iface="eth0" netns="/var/run/netns/cni-4ed0bc63-7a29-9438-a853-c8592ee24330" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.777 [INFO][2418] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" iface="eth0" netns="/var/run/netns/cni-4ed0bc63-7a29-9438-a853-c8592ee24330" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.777 [INFO][2418] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" iface="eth0" netns="/var/run/netns/cni-4ed0bc63-7a29-9438-a853-c8592ee24330" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.777 [INFO][2418] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.777 [INFO][2418] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.794 [INFO][2427] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.794 [INFO][2427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.794 [INFO][2427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.857 [WARNING][2427] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.857 [INFO][2427] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.859 [INFO][2427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:40.862042 env[1199]: 2024-12-13 01:49:40.860 [INFO][2418] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:49:40.862505 env[1199]: time="2024-12-13T01:49:40.862237146Z" level=info msg="TearDown network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" successfully" Dec 13 01:49:40.862505 env[1199]: time="2024-12-13T01:49:40.862271251Z" level=info msg="StopPodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" returns successfully" Dec 13 01:49:40.863239 env[1199]: time="2024-12-13T01:49:40.863211878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66jmt,Uid:31dbc540-8737-4500-8869-4ca48099a8a8,Namespace:calico-system,Attempt:1,}" Dec 13 01:49:40.864215 systemd[1]: run-netns-cni\x2d4ed0bc63\x2d7a29\x2d9438\x2da853\x2dc8592ee24330.mount: Deactivated successfully. Dec 13 01:49:40.936501 kubelet[1452]: E1213 01:49:40.936410 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:41.176000 audit[2437]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:41.179322 kernel: kauditd_printk_skb: 560 callbacks suppressed Dec 13 01:49:41.179396 kernel: audit: type=1325 audit(1734054581.176:632): table=filter:73 family=2 entries=10 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:41.176000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe9ab27210 a2=0 a3=7ffe9ab271fc items=0 ppid=1604 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.189916 kernel: audit: type=1300 audit(1734054581.176:632): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe9ab27210 a2=0 a3=7ffe9ab271fc items=0 ppid=1604 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.190008 kernel: audit: type=1327 audit(1734054581.176:632): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:41.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:41.197000 audit[2437]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:41.197000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe9ab27210 a2=0 a3=7ffe9ab271fc items=0 ppid=1604 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.205712 kernel: audit: type=1325 audit(1734054581.197:633): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:41.205785 kernel: audit: type=1300 audit(1734054581.197:633): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe9ab27210 a2=0 a3=7ffe9ab271fc items=0 ppid=1604 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:41.208053 kernel: audit: type=1327 audit(1734054581.197:633): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:41.283520 systemd-networkd[1028]: cali104eda33488: Link UP Dec 13 01:49:41.286127 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:41.286201 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali104eda33488: link becomes ready Dec 13 01:49:41.286305 systemd-networkd[1028]: cali104eda33488: Gained carrier Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.217 [INFO][2439] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-csi--node--driver--66jmt-eth0 csi-node-driver- calico-system 31dbc540-8737-4500-8869-4ca48099a8a8 960 0 2024-12-13 01:49:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.28 csi-node-driver-66jmt eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali104eda33488 [] []}} ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.217 [INFO][2439] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.243 [INFO][2453] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" HandleID="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.251 [INFO][2453] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" HandleID="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000435970), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.28", "pod":"csi-node-driver-66jmt", "timestamp":"2024-12-13 01:49:41.243234617 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.251 [INFO][2453] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.251 [INFO][2453] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.251 [INFO][2453] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.253 [INFO][2453] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.257 [INFO][2453] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.261 [INFO][2453] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.263 [INFO][2453] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.265 [INFO][2453] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.265 [INFO][2453] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.267 [INFO][2453] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709 Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.271 [INFO][2453] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.277 [INFO][2453] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.193/26] block=192.168.75.192/26 handle="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.277 [INFO][2453] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.193/26] handle="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" host="10.0.0.28" Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.277 [INFO][2453] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:41.296784 env[1199]: 2024-12-13 01:49:41.277 [INFO][2453] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.193/26] IPv6=[] ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" HandleID="k8s-pod-network.c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.297700 env[1199]: 2024-12-13 01:49:41.279 [INFO][2439] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--66jmt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31dbc540-8737-4500-8869-4ca48099a8a8", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"csi-node-driver-66jmt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali104eda33488", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:41.297700 env[1199]: 2024-12-13 01:49:41.279 [INFO][2439] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.193/32] ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.297700 env[1199]: 2024-12-13 01:49:41.279 [INFO][2439] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali104eda33488 ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.297700 env[1199]: 2024-12-13 01:49:41.286 [INFO][2439] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.297700 env[1199]: 2024-12-13 01:49:41.286 [INFO][2439] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--66jmt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31dbc540-8737-4500-8869-4ca48099a8a8", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709", Pod:"csi-node-driver-66jmt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali104eda33488", MAC:"86:2d:f8:44:f2:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:41.297700 env[1199]: 2024-12-13 01:49:41.293 [INFO][2439] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709" Namespace="calico-system" Pod="csi-node-driver-66jmt" WorkloadEndpoint="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:49:41.303000 audit[2478]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:41.303000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcfe793bd0 a2=0 a3=7ffcfe793bbc items=0 ppid=2147 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.308042 env[1199]: time="2024-12-13T01:49:41.307940561Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:41.308042 env[1199]: time="2024-12-13T01:49:41.308028719Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:41.308139 env[1199]: time="2024-12-13T01:49:41.308044029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:41.308317 env[1199]: time="2024-12-13T01:49:41.308252817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709 pid=2485 runtime=io.containerd.runc.v2 Dec 13 01:49:41.312537 kernel: audit: type=1325 audit(1734054581.303:634): table=filter:75 family=2 entries=34 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:41.312582 kernel: audit: type=1300 audit(1734054581.303:634): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcfe793bd0 a2=0 a3=7ffcfe793bbc items=0 ppid=2147 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.312599 kernel: audit: type=1327 audit(1734054581.303:634): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:41.303000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:41.324790 systemd[1]: Started cri-containerd-c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709.scope. Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.337011 kernel: audit: type=1400 audit(1734054581.332:635): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.335000 audit: BPF prog-id=94 op=LOAD Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2485 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336636643563336537336263393234306163626161373234636633 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2485 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336636643563336537336263393234306163626161373234636633 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit: BPF prog-id=95 op=LOAD Dec 13 01:49:41.336000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0000aaaf0 items=0 ppid=2485 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336636643563336537336263393234306163626161373234636633 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit: BPF prog-id=96 op=LOAD Dec 13 01:49:41.336000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0000aab38 items=0 ppid=2485 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336636643563336537336263393234306163626161373234636633 Dec 13 01:49:41.336000 audit: BPF prog-id=96 op=UNLOAD Dec 13 01:49:41.336000 audit: BPF prog-id=95 op=UNLOAD Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:41.336000 audit: BPF prog-id=97 op=LOAD Dec 13 01:49:41.336000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0000aaf48 items=0 ppid=2485 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336636643563336537336263393234306163626161373234636633 Dec 13 01:49:41.338528 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:41.348390 env[1199]: time="2024-12-13T01:49:41.348341316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66jmt,Uid:31dbc540-8737-4500-8869-4ca48099a8a8,Namespace:calico-system,Attempt:1,} returns sandbox id \"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709\"" Dec 13 01:49:41.350519 env[1199]: time="2024-12-13T01:49:41.350492032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:49:41.937002 kubelet[1452]: E1213 01:49:41.936935 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:42.432217 systemd-networkd[1028]: cali104eda33488: Gained IPv6LL Dec 13 01:49:42.887199 env[1199]: time="2024-12-13T01:49:42.887132241Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.889742 env[1199]: time="2024-12-13T01:49:42.889712461Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.891887 env[1199]: time="2024-12-13T01:49:42.891861700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.893764 env[1199]: time="2024-12-13T01:49:42.893735553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.894168 env[1199]: time="2024-12-13T01:49:42.894138071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:49:42.895684 env[1199]: time="2024-12-13T01:49:42.895657818Z" level=info msg="CreateContainer within sandbox \"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:49:42.910264 env[1199]: time="2024-12-13T01:49:42.910194800Z" level=info msg="CreateContainer within sandbox \"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f6fb16faed8bd3b612bc6d994fa9a950b14e94886eee36279f34f212decc60ea\"" Dec 13 01:49:42.910778 env[1199]: time="2024-12-13T01:49:42.910741873Z" level=info msg="StartContainer for \"f6fb16faed8bd3b612bc6d994fa9a950b14e94886eee36279f34f212decc60ea\"" Dec 13 01:49:42.930264 systemd[1]: Started cri-containerd-f6fb16faed8bd3b612bc6d994fa9a950b14e94886eee36279f34f212decc60ea.scope. Dec 13 01:49:42.939050 kubelet[1452]: E1213 01:49:42.937999 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe6e53c69f8 items=0 ppid=2485 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636666231366661656438626433623631326263366439393466613961 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit: BPF prog-id=98 op=LOAD Dec 13 01:49:42.942000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028ea58 items=0 ppid=2485 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636666231366661656438626433623631326263366439393466613961 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit: BPF prog-id=99 op=LOAD Dec 13 01:49:42.942000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028eaa8 items=0 ppid=2485 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636666231366661656438626433623631326263366439393466613961 Dec 13 01:49:42.942000 audit: BPF prog-id=99 op=UNLOAD Dec 13 01:49:42.942000 audit: BPF prog-id=98 op=UNLOAD Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.942000 audit: BPF prog-id=100 op=LOAD Dec 13 01:49:42.942000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028eb38 items=0 ppid=2485 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636666231366661656438626433623631326263366439393466613961 Dec 13 01:49:42.955330 env[1199]: time="2024-12-13T01:49:42.955261699Z" level=info msg="StartContainer for \"f6fb16faed8bd3b612bc6d994fa9a950b14e94886eee36279f34f212decc60ea\" returns successfully" Dec 13 01:49:42.956296 env[1199]: time="2024-12-13T01:49:42.956254772Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:49:43.938208 kubelet[1452]: E1213 01:49:43.938149 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:44.406389 env[1199]: time="2024-12-13T01:49:44.406315561Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:44.408206 env[1199]: time="2024-12-13T01:49:44.408166863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:44.409592 env[1199]: time="2024-12-13T01:49:44.409558362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:44.411026 env[1199]: time="2024-12-13T01:49:44.410974217Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:44.411520 env[1199]: time="2024-12-13T01:49:44.411486712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:49:44.412983 env[1199]: time="2024-12-13T01:49:44.412953593Z" level=info msg="CreateContainer within sandbox \"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:49:44.426409 env[1199]: time="2024-12-13T01:49:44.426362683Z" level=info msg="CreateContainer within sandbox \"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"7238eb67c7d3c5093c33326596a89c5fe18589da4f99796be4a8bc7944534675\"" Dec 13 01:49:44.426761 env[1199]: time="2024-12-13T01:49:44.426729561Z" level=info msg="StartContainer for \"7238eb67c7d3c5093c33326596a89c5fe18589da4f99796be4a8bc7944534675\"" Dec 13 01:49:44.448627 systemd[1]: run-containerd-runc-k8s.io-7238eb67c7d3c5093c33326596a89c5fe18589da4f99796be4a8bc7944534675-runc.w2M2cs.mount: Deactivated successfully. Dec 13 01:49:44.451239 systemd[1]: Started cri-containerd-7238eb67c7d3c5093c33326596a89c5fe18589da4f99796be4a8bc7944534675.scope. Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0552382138 items=0 ppid=2485 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333865623637633764336335303933633333333236353936613839 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit: BPF prog-id=101 op=LOAD Dec 13 01:49:44.464000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000182f58 items=0 ppid=2485 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333865623637633764336335303933633333333236353936613839 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.464000 audit: BPF prog-id=102 op=LOAD Dec 13 01:49:44.464000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000182fa8 items=0 ppid=2485 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333865623637633764336335303933633333333236353936613839 Dec 13 01:49:44.465000 audit: BPF prog-id=102 op=UNLOAD Dec 13 01:49:44.465000 audit: BPF prog-id=101 op=UNLOAD Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.465000 audit: BPF prog-id=103 op=LOAD Dec 13 01:49:44.465000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000183038 items=0 ppid=2485 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333865623637633764336335303933633333333236353936613839 Dec 13 01:49:44.524093 env[1199]: time="2024-12-13T01:49:44.524040358Z" level=info msg="StartContainer for \"7238eb67c7d3c5093c33326596a89c5fe18589da4f99796be4a8bc7944534675\" returns successfully" Dec 13 01:49:44.626871 kubelet[1452]: I1213 01:49:44.626828 1452 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:49:44.626871 kubelet[1452]: I1213 01:49:44.626868 1452 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:49:44.746594 kubelet[1452]: I1213 01:49:44.746442 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-66jmt" podStartSLOduration=32.684696701 podStartE2EDuration="35.746397697s" podCreationTimestamp="2024-12-13 01:49:09 +0000 UTC" firstStartedPulling="2024-12-13 01:49:41.350031643 +0000 UTC m=+32.934063012" lastFinishedPulling="2024-12-13 01:49:44.411732639 +0000 UTC m=+35.995764008" observedRunningTime="2024-12-13 01:49:44.746229236 +0000 UTC m=+36.330260615" watchObservedRunningTime="2024-12-13 01:49:44.746397697 +0000 UTC m=+36.330429066" Dec 13 01:49:44.938876 kubelet[1452]: E1213 01:49:44.938794 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:45.657902 env[1199]: time="2024-12-13T01:49:45.657859790Z" level=info msg="StopPodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\"" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.692 [INFO][2618] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.692 [INFO][2618] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" iface="eth0" netns="/var/run/netns/cni-bd735b54-7f8e-254d-bafd-45929d26d27a" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.692 [INFO][2618] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" iface="eth0" netns="/var/run/netns/cni-bd735b54-7f8e-254d-bafd-45929d26d27a" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.693 [INFO][2618] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" iface="eth0" netns="/var/run/netns/cni-bd735b54-7f8e-254d-bafd-45929d26d27a" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.693 [INFO][2618] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.693 [INFO][2618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.713 [INFO][2625] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.713 [INFO][2625] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.713 [INFO][2625] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.718 [WARNING][2625] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.718 [INFO][2625] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.719 [INFO][2625] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:45.722122 env[1199]: 2024-12-13 01:49:45.720 [INFO][2618] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:49:45.723440 env[1199]: time="2024-12-13T01:49:45.722338151Z" level=info msg="TearDown network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" successfully" Dec 13 01:49:45.723440 env[1199]: time="2024-12-13T01:49:45.722379610Z" level=info msg="StopPodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" returns successfully" Dec 13 01:49:45.724374 systemd[1]: run-netns-cni\x2dbd735b54\x2d7f8e\x2d254d\x2dbafd\x2d45929d26d27a.mount: Deactivated successfully. Dec 13 01:49:45.725270 env[1199]: time="2024-12-13T01:49:45.725230541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ffs7j,Uid:5a3092c7-6974-473f-acaf-d6b57453ae33,Namespace:default,Attempt:1,}" Dec 13 01:49:45.823469 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:45.823579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14ba7fdf068: link becomes ready Dec 13 01:49:45.823780 systemd-networkd[1028]: cali14ba7fdf068: Link UP Dec 13 01:49:45.824020 systemd-networkd[1028]: cali14ba7fdf068: Gained carrier Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.765 [INFO][2632] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0 nginx-deployment-6d5f899847- default 5a3092c7-6974-473f-acaf-d6b57453ae33 1006 0 2024-12-13 01:49:31 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.28 nginx-deployment-6d5f899847-ffs7j eth0 default [] [] [kns.default ksa.default.default] cali14ba7fdf068 [] []}} ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.765 [INFO][2632] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.790 [INFO][2646] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" HandleID="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.797 [INFO][2646] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" HandleID="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309180), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.28", "pod":"nginx-deployment-6d5f899847-ffs7j", "timestamp":"2024-12-13 01:49:45.790150371 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.797 [INFO][2646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.797 [INFO][2646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.797 [INFO][2646] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.799 [INFO][2646] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.802 [INFO][2646] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.806 [INFO][2646] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.807 [INFO][2646] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.809 [INFO][2646] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.809 [INFO][2646] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.810 [INFO][2646] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.814 [INFO][2646] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.818 [INFO][2646] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.194/26] block=192.168.75.192/26 handle="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.818 [INFO][2646] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.194/26] handle="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" host="10.0.0.28" Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.818 [INFO][2646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:45.832556 env[1199]: 2024-12-13 01:49:45.818 [INFO][2646] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.194/26] IPv6=[] ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" HandleID="k8s-pod-network.2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.833350 env[1199]: 2024-12-13 01:49:45.819 [INFO][2632] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5a3092c7-6974-473f-acaf-d6b57453ae33", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"nginx-deployment-6d5f899847-ffs7j", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali14ba7fdf068", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:45.833350 env[1199]: 2024-12-13 01:49:45.819 [INFO][2632] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.194/32] ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.833350 env[1199]: 2024-12-13 01:49:45.820 [INFO][2632] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali14ba7fdf068 ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.833350 env[1199]: 2024-12-13 01:49:45.823 [INFO][2632] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.833350 env[1199]: 2024-12-13 01:49:45.824 [INFO][2632] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5a3092c7-6974-473f-acaf-d6b57453ae33", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d", Pod:"nginx-deployment-6d5f899847-ffs7j", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali14ba7fdf068", MAC:"7a:ee:d8:92:6a:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:45.833350 env[1199]: 2024-12-13 01:49:45.830 [INFO][2632] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d" Namespace="default" Pod="nginx-deployment-6d5f899847-ffs7j" WorkloadEndpoint="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:49:45.840000 audit[2669]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:45.840000 audit[2669]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe876406d0 a2=0 a3=7ffe876406bc items=0 ppid=2147 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.840000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:45.853642 env[1199]: time="2024-12-13T01:49:45.852507008Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:45.853642 env[1199]: time="2024-12-13T01:49:45.852563927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:45.853642 env[1199]: time="2024-12-13T01:49:45.852575930Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:45.853642 env[1199]: time="2024-12-13T01:49:45.852703181Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d pid=2677 runtime=io.containerd.runc.v2 Dec 13 01:49:45.868563 systemd[1]: Started cri-containerd-2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d.scope. Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit: BPF prog-id=104 op=LOAD Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2677 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393962363734313334346563323861643930343038646463336564 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2677 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393962363734313334346563323861643930343038646463336564 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit: BPF prog-id=105 op=LOAD Dec 13 01:49:45.882000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a3a50 items=0 ppid=2677 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393962363734313334346563323861643930343038646463336564 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit: BPF prog-id=106 op=LOAD Dec 13 01:49:45.882000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a3a98 items=0 ppid=2677 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393962363734313334346563323861643930343038646463336564 Dec 13 01:49:45.882000 audit: BPF prog-id=106 op=UNLOAD Dec 13 01:49:45.882000 audit: BPF prog-id=105 op=UNLOAD Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.882000 audit: BPF prog-id=107 op=LOAD Dec 13 01:49:45.882000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a3ea8 items=0 ppid=2677 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393962363734313334346563323861643930343038646463336564 Dec 13 01:49:45.884677 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:45.912934 env[1199]: time="2024-12-13T01:49:45.910717582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ffs7j,Uid:5a3092c7-6974-473f-acaf-d6b57453ae33,Namespace:default,Attempt:1,} returns sandbox id \"2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d\"" Dec 13 01:49:45.912934 env[1199]: time="2024-12-13T01:49:45.912820751Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 01:49:45.939180 kubelet[1452]: E1213 01:49:45.939130 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:45.991000 audit[2711]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:45.991000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe5dc48040 a2=0 a3=7ffe5dc4802c items=0 ppid=1604 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:45.996000 audit[2711]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:45.996000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe5dc48040 a2=0 a3=7ffe5dc4802c items=0 ppid=1604 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:46.535470 update_engine[1191]: I1213 01:49:46.535416 1191 update_attempter.cc:509] Updating boot flags... Dec 13 01:49:46.723766 systemd[1]: run-containerd-runc-k8s.io-2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d-runc.8dhcgS.mount: Deactivated successfully. Dec 13 01:49:46.940291 kubelet[1452]: E1213 01:49:46.940223 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:47.040220 systemd-networkd[1028]: cali14ba7fdf068: Gained IPv6LL Dec 13 01:49:47.941240 kubelet[1452]: E1213 01:49:47.941175 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:48.914688 kubelet[1452]: E1213 01:49:48.914637 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:48.941862 kubelet[1452]: E1213 01:49:48.941796 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:49.046967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1723486696.mount: Deactivated successfully. Dec 13 01:49:49.919000 audit[2733]: NETFILTER_CFG table=filter:79 family=2 entries=10 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.924189 kernel: kauditd_printk_skb: 208 callbacks suppressed Dec 13 01:49:49.924268 kernel: audit: type=1325 audit(1734054589.919:686): table=filter:79 family=2 entries=10 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.924297 kernel: audit: type=1300 audit(1734054589.919:686): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcdd7fbee0 a2=0 a3=7ffcdd7fbecc items=0 ppid=1604 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.919000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcdd7fbee0 a2=0 a3=7ffcdd7fbecc items=0 ppid=1604 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.931021 kernel: audit: type=1327 audit(1734054589.919:686): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.932000 audit[2733]: NETFILTER_CFG table=nat:80 family=2 entries=44 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.932000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcdd7fbee0 a2=0 a3=7ffcdd7fbecc items=0 ppid=1604 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.940647 kernel: audit: type=1325 audit(1734054589.932:687): table=nat:80 family=2 entries=44 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.940700 kernel: audit: type=1300 audit(1734054589.932:687): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcdd7fbee0 a2=0 a3=7ffcdd7fbecc items=0 ppid=1604 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.940725 kernel: audit: type=1327 audit(1734054589.932:687): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.942860 kubelet[1452]: E1213 01:49:49.942825 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:49.947000 audit[2735]: NETFILTER_CFG table=filter:81 family=2 entries=10 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.947000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe3c7e4070 a2=0 a3=7ffe3c7e405c items=0 ppid=1604 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.955362 kernel: audit: type=1325 audit(1734054589.947:688): table=filter:81 family=2 entries=10 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.955407 kernel: audit: type=1300 audit(1734054589.947:688): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe3c7e4070 a2=0 a3=7ffe3c7e405c items=0 ppid=1604 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.955432 kernel: audit: type=1327 audit(1734054589.947:688): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.962000 audit[2735]: NETFILTER_CFG table=nat:82 family=2 entries=56 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.962000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe3c7e4070 a2=0 a3=7ffe3c7e405c items=0 ppid=1604 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.971028 kernel: audit: type=1325 audit(1734054589.962:689): table=nat:82 family=2 entries=56 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:50.943077 kubelet[1452]: E1213 01:49:50.942984 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:51.362062 env[1199]: time="2024-12-13T01:49:51.362015073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:51.363854 env[1199]: time="2024-12-13T01:49:51.363817736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:51.365490 env[1199]: time="2024-12-13T01:49:51.365455847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:51.367031 env[1199]: time="2024-12-13T01:49:51.367003206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:51.367622 env[1199]: time="2024-12-13T01:49:51.367585178Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 01:49:51.369137 env[1199]: time="2024-12-13T01:49:51.369112149Z" level=info msg="CreateContainer within sandbox \"2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 01:49:51.380882 env[1199]: time="2024-12-13T01:49:51.380846213Z" level=info msg="CreateContainer within sandbox \"2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"e595ea367ce4827c2536f1efcd34233704b59e74ad0a1ccf30875c7bf944a39d\"" Dec 13 01:49:51.381263 env[1199]: time="2024-12-13T01:49:51.381222416Z" level=info msg="StartContainer for \"e595ea367ce4827c2536f1efcd34233704b59e74ad0a1ccf30875c7bf944a39d\"" Dec 13 01:49:51.397824 systemd[1]: Started cri-containerd-e595ea367ce4827c2536f1efcd34233704b59e74ad0a1ccf30875c7bf944a39d.scope. Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit: BPF prog-id=108 op=LOAD Dec 13 01:49:51.406000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.406000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2677 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393565613336376365343832376332353336663165666364333432 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2677 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393565613336376365343832376332353336663165666364333432 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit: BPF prog-id=109 op=LOAD Dec 13 01:49:51.407000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0001dfe40 items=0 ppid=2677 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393565613336376365343832376332353336663165666364333432 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit: BPF prog-id=110 op=LOAD Dec 13 01:49:51.407000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0001dfe88 items=0 ppid=2677 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393565613336376365343832376332353336663165666364333432 Dec 13 01:49:51.407000 audit: BPF prog-id=110 op=UNLOAD Dec 13 01:49:51.407000 audit: BPF prog-id=109 op=UNLOAD Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.407000 audit: BPF prog-id=111 op=LOAD Dec 13 01:49:51.407000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00028e298 items=0 ppid=2677 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393565613336376365343832376332353336663165666364333432 Dec 13 01:49:51.420023 env[1199]: time="2024-12-13T01:49:51.419954974Z" level=info msg="StartContainer for \"e595ea367ce4827c2536f1efcd34233704b59e74ad0a1ccf30875c7bf944a39d\" returns successfully" Dec 13 01:49:51.943540 kubelet[1452]: E1213 01:49:51.943522 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:52.944523 kubelet[1452]: E1213 01:49:52.944458 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:53.945338 kubelet[1452]: E1213 01:49:53.945255 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:54.216000 audit[2800]: NETFILTER_CFG table=filter:83 family=2 entries=22 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.216000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fffd8d42d70 a2=0 a3=7fffd8d42d5c items=0 ppid=1604 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.221000 audit[2800]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.221000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffd8d42d70 a2=0 a3=0 items=0 ppid=1604 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.231000 audit[2802]: NETFILTER_CFG table=filter:85 family=2 entries=34 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.231000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd459dc150 a2=0 a3=7ffd459dc13c items=0 ppid=1604 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.239000 audit[2802]: NETFILTER_CFG table=nat:86 family=2 entries=20 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.239000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd459dc150 a2=0 a3=0 items=0 ppid=1604 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.259763 kubelet[1452]: I1213 01:49:54.259729 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-ffs7j" podStartSLOduration=17.804116268 podStartE2EDuration="23.259688028s" podCreationTimestamp="2024-12-13 01:49:31 +0000 UTC" firstStartedPulling="2024-12-13 01:49:45.912258282 +0000 UTC m=+37.496289641" lastFinishedPulling="2024-12-13 01:49:51.367830032 +0000 UTC m=+42.951861401" observedRunningTime="2024-12-13 01:49:51.758802691 +0000 UTC m=+43.342834060" watchObservedRunningTime="2024-12-13 01:49:54.259688028 +0000 UTC m=+45.843719387" Dec 13 01:49:54.259893 kubelet[1452]: I1213 01:49:54.259841 1452 topology_manager.go:215] "Topology Admit Handler" podUID="205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 01:49:54.263831 systemd[1]: Created slice kubepods-besteffort-pod205dc208_5fa6_4b71_8c06_d3cb2f4e6dd2.slice. Dec 13 01:49:54.330888 kubelet[1452]: I1213 01:49:54.330865 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7csnr\" (UniqueName: \"kubernetes.io/projected/205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2-kube-api-access-7csnr\") pod \"nfs-server-provisioner-0\" (UID: \"205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2\") " pod="default/nfs-server-provisioner-0" Dec 13 01:49:54.330888 kubelet[1452]: I1213 01:49:54.330898 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2-data\") pod \"nfs-server-provisioner-0\" (UID: \"205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2\") " pod="default/nfs-server-provisioner-0" Dec 13 01:49:54.566236 env[1199]: time="2024-12-13T01:49:54.566186872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2,Namespace:default,Attempt:0,}" Dec 13 01:49:54.663575 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:54.663688 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 01:49:54.661431 systemd-networkd[1028]: cali60e51b789ff: Link UP Dec 13 01:49:54.663622 systemd-networkd[1028]: cali60e51b789ff: Gained carrier Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.606 [INFO][2809] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2 1093 0 2024-12-13 01:49:54 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.28 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.607 [INFO][2809] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.629 [INFO][2818] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" HandleID="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Workload="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.637 [INFO][2818] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" HandleID="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Workload="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004055c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.28", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 01:49:54.629803956 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.637 [INFO][2818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.637 [INFO][2818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.637 [INFO][2818] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.638 [INFO][2818] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.640 [INFO][2818] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.644 [INFO][2818] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.645 [INFO][2818] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.646 [INFO][2818] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.646 [INFO][2818] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.647 [INFO][2818] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203 Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.650 [INFO][2818] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.658 [INFO][2818] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.195/26] block=192.168.75.192/26 handle="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.658 [INFO][2818] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.195/26] handle="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" host="10.0.0.28" Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.658 [INFO][2818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:54.672688 env[1199]: 2024-12-13 01:49:54.658 [INFO][2818] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.195/26] IPv6=[] ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" HandleID="k8s-pod-network.e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Workload="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.673298 env[1199]: 2024-12-13 01:49:54.660 [INFO][2809] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:54.673298 env[1199]: 2024-12-13 01:49:54.660 [INFO][2809] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.195/32] ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.673298 env[1199]: 2024-12-13 01:49:54.660 [INFO][2809] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.673298 env[1199]: 2024-12-13 01:49:54.664 [INFO][2809] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.673461 env[1199]: 2024-12-13 01:49:54.664 [INFO][2809] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b6:05:c3:f7:05:ef", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:54.673461 env[1199]: 2024-12-13 01:49:54.671 [INFO][2809] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.28-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:49:54.679000 audit[2841]: NETFILTER_CFG table=filter:87 family=2 entries=44 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:54.679000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffe9c1d14b0 a2=0 a3=7ffe9c1d149c items=0 ppid=2147 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:54.683134 env[1199]: time="2024-12-13T01:49:54.683065356Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:54.683134 env[1199]: time="2024-12-13T01:49:54.683104179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:54.683134 env[1199]: time="2024-12-13T01:49:54.683113656Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:54.683299 env[1199]: time="2024-12-13T01:49:54.683218736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203 pid=2848 runtime=io.containerd.runc.v2 Dec 13 01:49:54.697689 systemd[1]: Started cri-containerd-e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203.scope. Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.706000 audit: BPF prog-id=112 op=LOAD Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2848 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534376261636434653662663664636239616237636235333864373964 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2848 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534376261636434653662663664636239616237636235333864373964 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit: BPF prog-id=113 op=LOAD Dec 13 01:49:54.707000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00008f870 items=0 ppid=2848 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534376261636434653662663664636239616237636235333864373964 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.707000 audit: BPF prog-id=114 op=LOAD Dec 13 01:49:54.707000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00008f8b8 items=0 ppid=2848 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534376261636434653662663664636239616237636235333864373964 Dec 13 01:49:54.708000 audit: BPF prog-id=114 op=UNLOAD Dec 13 01:49:54.708000 audit: BPF prog-id=113 op=UNLOAD Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.708000 audit: BPF prog-id=115 op=LOAD Dec 13 01:49:54.708000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00008fcc8 items=0 ppid=2848 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534376261636434653662663664636239616237636235333864373964 Dec 13 01:49:54.709729 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:54.732487 env[1199]: time="2024-12-13T01:49:54.732443264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:205dc208-5fa6-4b71-8c06-d3cb2f4e6dd2,Namespace:default,Attempt:0,} returns sandbox id \"e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203\"" Dec 13 01:49:54.733855 env[1199]: time="2024-12-13T01:49:54.733825567Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 01:49:54.945974 kubelet[1452]: E1213 01:49:54.945831 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:55.440439 systemd[1]: run-containerd-runc-k8s.io-e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203-runc.vSv3it.mount: Deactivated successfully. Dec 13 01:49:55.946168 kubelet[1452]: E1213 01:49:55.946104 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:56.192241 systemd-networkd[1028]: cali60e51b789ff: Gained IPv6LL Dec 13 01:49:56.947260 kubelet[1452]: E1213 01:49:56.947194 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:57.289375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3130684022.mount: Deactivated successfully. Dec 13 01:49:57.948425 kubelet[1452]: E1213 01:49:57.948362 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:58.949026 kubelet[1452]: E1213 01:49:58.948964 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:49:59.390000 audit[2891]: NETFILTER_CFG table=filter:88 family=2 entries=33 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.392531 kernel: kauditd_printk_skb: 131 callbacks suppressed Dec 13 01:49:59.392606 kernel: audit: type=1325 audit(1734054599.390:731): table=filter:88 family=2 entries=33 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.390000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff813b5b70 a2=0 a3=7fff813b5b5c items=0 ppid=1604 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.412733 kernel: audit: type=1300 audit(1734054599.390:731): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff813b5b70 a2=0 a3=7fff813b5b5c items=0 ppid=1604 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.412792 kernel: audit: type=1327 audit(1734054599.390:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.414000 audit[2891]: NETFILTER_CFG table=nat:89 family=2 entries=27 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.418155 kernel: audit: type=1325 audit(1734054599.414:732): table=nat:89 family=2 entries=27 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.418205 kernel: audit: type=1300 audit(1734054599.414:732): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff813b5b70 a2=0 a3=0 items=0 ppid=1604 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.414000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff813b5b70 a2=0 a3=0 items=0 ppid=1604 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.424725 kernel: audit: type=1327 audit(1734054599.414:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.949739 kubelet[1452]: E1213 01:49:59.949684 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:00.365424 env[1199]: time="2024-12-13T01:50:00.365356097Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:00.367197 env[1199]: time="2024-12-13T01:50:00.367164687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:00.368833 env[1199]: time="2024-12-13T01:50:00.368799470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:00.370334 env[1199]: time="2024-12-13T01:50:00.370294248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:00.370983 env[1199]: time="2024-12-13T01:50:00.370946758Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 01:50:00.372884 env[1199]: time="2024-12-13T01:50:00.372838264Z" level=info msg="CreateContainer within sandbox \"e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 01:50:00.384588 env[1199]: time="2024-12-13T01:50:00.384530741Z" level=info msg="CreateContainer within sandbox \"e47bacd4e6bf6dcb9ab7cb538d79dab6ccac21f40fcbb1a1188d54d2581c5203\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"19634c0974f944a58ee022146159517614d214428f785e8d6e32848aa4269221\"" Dec 13 01:50:00.385102 env[1199]: time="2024-12-13T01:50:00.385059838Z" level=info msg="StartContainer for \"19634c0974f944a58ee022146159517614d214428f785e8d6e32848aa4269221\"" Dec 13 01:50:00.399805 systemd[1]: Started cri-containerd-19634c0974f944a58ee022146159517614d214428f785e8d6e32848aa4269221.scope. Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.416688 kernel: audit: type=1400 audit(1734054600.409:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.416754 kernel: audit: type=1400 audit(1734054600.409:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.416789 kernel: audit: type=1400 audit(1734054600.409:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422878 kernel: audit: type=1400 audit(1734054600.409:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.412000 audit: BPF prog-id=116 op=LOAD Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2848 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139363334633039373466393434613538656530323231343631353935 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2848 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139363334633039373466393434613538656530323231343631353935 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.417000 audit: BPF prog-id=117 op=LOAD Dec 13 01:50:00.417000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000215d80 items=0 ppid=2848 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139363334633039373466393434613538656530323231343631353935 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.418000 audit: BPF prog-id=118 op=LOAD Dec 13 01:50:00.418000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000215dc8 items=0 ppid=2848 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139363334633039373466393434613538656530323231343631353935 Dec 13 01:50:00.421000 audit: BPF prog-id=118 op=UNLOAD Dec 13 01:50:00.421000 audit: BPF prog-id=117 op=UNLOAD Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:00.422000 audit: BPF prog-id=119 op=LOAD Dec 13 01:50:00.422000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003821d8 items=0 ppid=2848 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139363334633039373466393434613538656530323231343631353935 Dec 13 01:50:00.434555 env[1199]: time="2024-12-13T01:50:00.434483275Z" level=info msg="StartContainer for \"19634c0974f944a58ee022146159517614d214428f785e8d6e32848aa4269221\" returns successfully" Dec 13 01:50:00.471000 audit[2929]: AVC avc: denied { search } for pid=2929 comm="rpcbind" name="crypto" dev="proc" ino=23218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 01:50:00.471000 audit[2929]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4222dd30c0 a2=0 a3=0 items=0 ppid=2912 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 key=(null) Dec 13 01:50:00.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 01:50:00.501000 audit[2934]: AVC avc: denied { search } for pid=2934 comm="dbus-daemon" name="crypto" dev="proc" ino=23218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 01:50:00.501000 audit[2934]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbe8d32b0c0 a2=0 a3=0 items=0 ppid=2912 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 key=(null) Dec 13 01:50:00.501000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 01:50:00.504000 audit[2935]: AVC avc: denied { watch } for pid=2935 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538673 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c113,c653 tclass=dir permissive=0 Dec 13 01:50:00.504000 audit[2935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=564501f36940 a2=2c8 a3=7ffc69ccdf0c items=0 ppid=2912 pid=2935 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 key=(null) Dec 13 01:50:00.504000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 01:50:00.507000 audit[2936]: AVC avc: denied { read } for pid=2936 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 01:50:00.507000 audit[2936]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f4be78b7320 a1=80000 a2=d a3=7ffc93da5700 items=0 ppid=2912 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 key=(null) Dec 13 01:50:00.507000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 01:50:00.508000 audit[2936]: AVC avc: denied { search } for pid=2936 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23218 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 01:50:00.508000 audit[2936]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4be6e0b0c0 a2=0 a3=0 items=0 ppid=2912 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c653 key=(null) Dec 13 01:50:00.508000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 01:50:00.778239 kubelet[1452]: I1213 01:50:00.778109 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.140369427 podStartE2EDuration="6.778072877s" podCreationTimestamp="2024-12-13 01:49:54 +0000 UTC" firstStartedPulling="2024-12-13 01:49:54.733555456 +0000 UTC m=+46.317586826" lastFinishedPulling="2024-12-13 01:50:00.371258907 +0000 UTC m=+51.955290276" observedRunningTime="2024-12-13 01:50:00.777801616 +0000 UTC m=+52.361832975" watchObservedRunningTime="2024-12-13 01:50:00.778072877 +0000 UTC m=+52.362104246" Dec 13 01:50:00.787000 audit[2954]: NETFILTER_CFG table=filter:90 family=2 entries=20 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:00.787000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd6f9caf50 a2=0 a3=7ffd6f9caf3c items=0 ppid=1604 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:00.794000 audit[2954]: NETFILTER_CFG table=nat:91 family=2 entries=106 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:00.794000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd6f9caf50 a2=0 a3=7ffd6f9caf3c items=0 ppid=1604 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:00.950518 kubelet[1452]: E1213 01:50:00.950454 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:01.950970 kubelet[1452]: E1213 01:50:01.950918 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:02.951455 kubelet[1452]: E1213 01:50:02.951375 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:03.952172 kubelet[1452]: E1213 01:50:03.952127 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:04.952530 kubelet[1452]: E1213 01:50:04.952491 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:05.952684 kubelet[1452]: E1213 01:50:05.952634 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:06.953310 kubelet[1452]: E1213 01:50:06.953252 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:07.953749 kubelet[1452]: E1213 01:50:07.953672 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:08.356065 kubelet[1452]: E1213 01:50:08.356023 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:50:08.914887 kubelet[1452]: E1213 01:50:08.914858 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:08.954589 kubelet[1452]: E1213 01:50:08.954555 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:08.985760 env[1199]: time="2024-12-13T01:50:08.985721484Z" level=info msg="StopPodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\"" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.012 [WARNING][2997] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--66jmt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31dbc540-8737-4500-8869-4ca48099a8a8", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709", Pod:"csi-node-driver-66jmt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali104eda33488", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.012 [INFO][2997] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.012 [INFO][2997] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" iface="eth0" netns="" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.012 [INFO][2997] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.012 [INFO][2997] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.028 [INFO][3004] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.028 [INFO][3004] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.028 [INFO][3004] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.032 [WARNING][3004] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.032 [INFO][3004] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.033 [INFO][3004] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:09.035609 env[1199]: 2024-12-13 01:50:09.034 [INFO][2997] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.036151 env[1199]: time="2024-12-13T01:50:09.035640136Z" level=info msg="TearDown network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" successfully" Dec 13 01:50:09.036151 env[1199]: time="2024-12-13T01:50:09.035690831Z" level=info msg="StopPodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" returns successfully" Dec 13 01:50:09.036279 env[1199]: time="2024-12-13T01:50:09.036254652Z" level=info msg="RemovePodSandbox for \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\"" Dec 13 01:50:09.036343 env[1199]: time="2024-12-13T01:50:09.036292263Z" level=info msg="Forcibly stopping sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\"" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.063 [WARNING][3026] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-csi--node--driver--66jmt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31dbc540-8737-4500-8869-4ca48099a8a8", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"c13f6d5c3e73bc9240acbaa724cf32eadcb272282493c3cd15eae708aba1b709", Pod:"csi-node-driver-66jmt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali104eda33488", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.063 [INFO][3026] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.063 [INFO][3026] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" iface="eth0" netns="" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.063 [INFO][3026] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.063 [INFO][3026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.080 [INFO][3033] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.080 [INFO][3033] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.080 [INFO][3033] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.084 [WARNING][3033] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.084 [INFO][3033] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" HandleID="k8s-pod-network.c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Workload="10.0.0.28-k8s-csi--node--driver--66jmt-eth0" Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.086 [INFO][3033] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:09.088104 env[1199]: 2024-12-13 01:50:09.087 [INFO][3026] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807" Dec 13 01:50:09.088624 env[1199]: time="2024-12-13T01:50:09.088132073Z" level=info msg="TearDown network for sandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" successfully" Dec 13 01:50:09.092357 env[1199]: time="2024-12-13T01:50:09.092306285Z" level=info msg="RemovePodSandbox \"c3111b70073473fabfdf2a6abba0bacb8986d6ea02c589648f42c47971167807\" returns successfully" Dec 13 01:50:09.092937 env[1199]: time="2024-12-13T01:50:09.092906354Z" level=info msg="StopPodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\"" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.122 [WARNING][3056] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5a3092c7-6974-473f-acaf-d6b57453ae33", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d", Pod:"nginx-deployment-6d5f899847-ffs7j", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali14ba7fdf068", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.122 [INFO][3056] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.123 [INFO][3056] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" iface="eth0" netns="" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.123 [INFO][3056] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.123 [INFO][3056] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.138 [INFO][3064] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.138 [INFO][3064] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.139 [INFO][3064] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.143 [WARNING][3064] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.143 [INFO][3064] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.144 [INFO][3064] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:09.146787 env[1199]: 2024-12-13 01:50:09.145 [INFO][3056] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.147472 env[1199]: time="2024-12-13T01:50:09.146793165Z" level=info msg="TearDown network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" successfully" Dec 13 01:50:09.147472 env[1199]: time="2024-12-13T01:50:09.146831828Z" level=info msg="StopPodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" returns successfully" Dec 13 01:50:09.147472 env[1199]: time="2024-12-13T01:50:09.147402431Z" level=info msg="RemovePodSandbox for \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\"" Dec 13 01:50:09.147472 env[1199]: time="2024-12-13T01:50:09.147441805Z" level=info msg="Forcibly stopping sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\"" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.177 [WARNING][3087] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5a3092c7-6974-473f-acaf-d6b57453ae33", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"2f99b6741344ec28ad90408ddc3ed1cc19b3d8334c59450e8609af9d8698507d", Pod:"nginx-deployment-6d5f899847-ffs7j", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali14ba7fdf068", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.177 [INFO][3087] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.177 [INFO][3087] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" iface="eth0" netns="" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.177 [INFO][3087] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.177 [INFO][3087] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.194 [INFO][3095] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.194 [INFO][3095] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.194 [INFO][3095] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.199 [WARNING][3095] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.199 [INFO][3095] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" HandleID="k8s-pod-network.bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Workload="10.0.0.28-k8s-nginx--deployment--6d5f899847--ffs7j-eth0" Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.200 [INFO][3095] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:09.202429 env[1199]: 2024-12-13 01:50:09.201 [INFO][3087] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37" Dec 13 01:50:09.202429 env[1199]: time="2024-12-13T01:50:09.202383030Z" level=info msg="TearDown network for sandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" successfully" Dec 13 01:50:09.205161 env[1199]: time="2024-12-13T01:50:09.205125930Z" level=info msg="RemovePodSandbox \"bef4cfd5c9b7ae812906f940aab0026a6b9485d16be472e73abfdcbd89d55a37\" returns successfully" Dec 13 01:50:09.955467 kubelet[1452]: E1213 01:50:09.955419 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:10.704199 kubelet[1452]: I1213 01:50:10.704138 1452 topology_manager.go:215] "Topology Admit Handler" podUID="dc49b22b-b103-4975-a755-4e9e9fa449ba" podNamespace="default" podName="test-pod-1" Dec 13 01:50:10.708799 systemd[1]: Created slice kubepods-besteffort-poddc49b22b_b103_4975_a755_4e9e9fa449ba.slice. Dec 13 01:50:10.902835 kubelet[1452]: I1213 01:50:10.902796 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-828e544b-1f56-4ccb-83b1-768cfb6bc607\" (UniqueName: \"kubernetes.io/nfs/dc49b22b-b103-4975-a755-4e9e9fa449ba-pvc-828e544b-1f56-4ccb-83b1-768cfb6bc607\") pod \"test-pod-1\" (UID: \"dc49b22b-b103-4975-a755-4e9e9fa449ba\") " pod="default/test-pod-1" Dec 13 01:50:10.902835 kubelet[1452]: I1213 01:50:10.902839 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kqb6j\" (UniqueName: \"kubernetes.io/projected/dc49b22b-b103-4975-a755-4e9e9fa449ba-kube-api-access-kqb6j\") pod \"test-pod-1\" (UID: \"dc49b22b-b103-4975-a755-4e9e9fa449ba\") " pod="default/test-pod-1" Dec 13 01:50:10.955841 kubelet[1452]: E1213 01:50:10.955731 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:11.011000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.014524 kernel: Failed to create system directory netfs Dec 13 01:50:11.014594 kernel: kauditd_printk_skb: 74 callbacks suppressed Dec 13 01:50:11.014613 kernel: audit: type=1400 audit(1734054611.011:758): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.014649 kernel: Failed to create system directory netfs Dec 13 01:50:11.014667 kernel: Failed to create system directory netfs Dec 13 01:50:11.014680 kernel: Failed to create system directory netfs Dec 13 01:50:11.015316 kernel: audit: type=1400 audit(1734054611.011:758): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.015371 kernel: audit: type=1400 audit(1734054611.011:758): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.011000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.011000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.011000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030420 kernel: audit: type=1400 audit(1734054611.011:758): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.011000 audit[3107]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625b32945e0 a1=153bc a2=56257b5442b0 a3=5 items=0 ppid=519 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.011000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:50:11.037687 kernel: audit: type=1300 audit(1734054611.011:758): arch=c000003e syscall=175 success=yes exit=0 a0=5625b32945e0 a1=153bc a2=56257b5442b0 a3=5 items=0 ppid=519 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.037774 kernel: audit: type=1327 audit(1734054611.011:758): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:50:11.037814 kernel: Failed to create system directory fscache Dec 13 01:50:11.037831 kernel: audit: type=1400 audit(1734054611.030:759): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.042219 kernel: Failed to create system directory fscache Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.043658 kernel: Failed to create system directory fscache Dec 13 01:50:11.043691 kernel: audit: type=1400 audit(1734054611.030:759): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.043725 kernel: Failed to create system directory fscache Dec 13 01:50:11.047510 kernel: audit: type=1400 audit(1734054611.030:759): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.048255 kernel: Failed to create system directory fscache Dec 13 01:50:11.048288 kernel: Failed to create system directory fscache Dec 13 01:50:11.048309 kernel: Failed to create system directory fscache Dec 13 01:50:11.051477 kernel: audit: type=1400 audit(1734054611.030:759): avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.052207 kernel: Failed to create system directory fscache Dec 13 01:50:11.052248 kernel: Failed to create system directory fscache Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.059061 kernel: Failed to create system directory fscache Dec 13 01:50:11.059102 kernel: Failed to create system directory fscache Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.060502 kernel: Failed to create system directory fscache Dec 13 01:50:11.060532 kernel: Failed to create system directory fscache Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.030000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.062015 kernel: Failed to create system directory fscache Dec 13 01:50:11.030000 audit[3107]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625b34a99c0 a1=4c0fc a2=56257b5442b0 a3=5 items=0 ppid=519 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.030000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:50:11.064020 kernel: FS-Cache: Loaded Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.093272 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.093333 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.093357 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.094015 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.095421 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.095457 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.097572 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.097605 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.097622 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.099013 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.099049 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.100428 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.100461 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.102565 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.102611 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.102641 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.104014 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.104056 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.105418 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.105460 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.107549 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.107586 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.107611 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.109702 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.109733 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.109782 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.111132 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.111180 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.112550 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.112588 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.113275 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.114699 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.114734 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.116126 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.116153 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.117551 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.117585 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.119696 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.119728 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.119746 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.121125 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.121151 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.122547 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.122566 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.124014 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.124057 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.125429 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.125467 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.127572 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.127617 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.127648 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.129022 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.129049 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.130455 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.130493 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.132589 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.132615 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.132648 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.134031 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.134071 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.135458 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.135503 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.137613 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.137657 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.137680 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.139085 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.139118 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.140502 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.140530 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.142643 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.142681 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.142700 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.144074 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.144111 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.145523 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.145564 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.147012 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.147043 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.148419 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.148458 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.150558 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.150581 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.150603 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.152008 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.152035 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.153417 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.153436 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.155593 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.155624 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.155647 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.156316 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.158460 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.158500 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.158515 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.159184 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.160595 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.160626 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.162040 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.162065 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.163461 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.163491 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.165598 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.165618 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.165639 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.167033 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.167053 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.168450 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.168473 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.170612 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.170661 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.170677 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.172046 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.172067 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.173465 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.173483 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.175614 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.175664 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.175685 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.177041 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.177073 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.178469 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.178519 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.180612 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.180651 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.180669 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.082000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.182046 kernel: Failed to create system directory sunrpc Dec 13 01:50:11.191133 kernel: RPC: Registered named UNIX socket transport module. Dec 13 01:50:11.191193 kernel: RPC: Registered udp transport module. Dec 13 01:50:11.191208 kernel: RPC: Registered tcp transport module. Dec 13 01:50:11.192764 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 01:50:11.082000 audit[3107]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625b34f5ad0 a1=1a7f1c a2=56257b5442b0 a3=5 items=6 ppid=519 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.082000 audit: CWD cwd="/" Dec 13 01:50:11.082000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:50:11.082000 audit: PATH item=1 name=(null) inode=22476 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:50:11.082000 audit: PATH item=2 name=(null) inode=22476 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:50:11.082000 audit: PATH item=3 name=(null) inode=22477 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:50:11.082000 audit: PATH item=4 name=(null) inode=22476 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:50:11.082000 audit: PATH item=5 name=(null) inode=22478 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:50:11.082000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.228793 kernel: Failed to create system directory nfs Dec 13 01:50:11.228851 kernel: Failed to create system directory nfs Dec 13 01:50:11.228869 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.229472 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.231507 kernel: Failed to create system directory nfs Dec 13 01:50:11.231550 kernel: Failed to create system directory nfs Dec 13 01:50:11.231575 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.233546 kernel: Failed to create system directory nfs Dec 13 01:50:11.233586 kernel: Failed to create system directory nfs Dec 13 01:50:11.233610 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.235593 kernel: Failed to create system directory nfs Dec 13 01:50:11.235625 kernel: Failed to create system directory nfs Dec 13 01:50:11.235662 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.237644 kernel: Failed to create system directory nfs Dec 13 01:50:11.237673 kernel: Failed to create system directory nfs Dec 13 01:50:11.237694 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.239015 kernel: Failed to create system directory nfs Dec 13 01:50:11.239066 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.240360 kernel: Failed to create system directory nfs Dec 13 01:50:11.240398 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.242395 kernel: Failed to create system directory nfs Dec 13 01:50:11.242425 kernel: Failed to create system directory nfs Dec 13 01:50:11.242440 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.244435 kernel: Failed to create system directory nfs Dec 13 01:50:11.244472 kernel: Failed to create system directory nfs Dec 13 01:50:11.244489 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.246476 kernel: Failed to create system directory nfs Dec 13 01:50:11.246506 kernel: Failed to create system directory nfs Dec 13 01:50:11.246535 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.248520 kernel: Failed to create system directory nfs Dec 13 01:50:11.248571 kernel: Failed to create system directory nfs Dec 13 01:50:11.248594 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.250552 kernel: Failed to create system directory nfs Dec 13 01:50:11.250593 kernel: Failed to create system directory nfs Dec 13 01:50:11.250611 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.252590 kernel: Failed to create system directory nfs Dec 13 01:50:11.252619 kernel: Failed to create system directory nfs Dec 13 01:50:11.252641 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.254626 kernel: Failed to create system directory nfs Dec 13 01:50:11.254670 kernel: Failed to create system directory nfs Dec 13 01:50:11.254699 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.256009 kernel: Failed to create system directory nfs Dec 13 01:50:11.256042 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.257350 kernel: Failed to create system directory nfs Dec 13 01:50:11.257388 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.259388 kernel: Failed to create system directory nfs Dec 13 01:50:11.259429 kernel: Failed to create system directory nfs Dec 13 01:50:11.259446 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.261420 kernel: Failed to create system directory nfs Dec 13 01:50:11.261456 kernel: Failed to create system directory nfs Dec 13 01:50:11.261473 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.263458 kernel: Failed to create system directory nfs Dec 13 01:50:11.263488 kernel: Failed to create system directory nfs Dec 13 01:50:11.263513 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.265570 kernel: Failed to create system directory nfs Dec 13 01:50:11.265599 kernel: Failed to create system directory nfs Dec 13 01:50:11.265621 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.267598 kernel: Failed to create system directory nfs Dec 13 01:50:11.267636 kernel: Failed to create system directory nfs Dec 13 01:50:11.267660 kernel: Failed to create system directory nfs Dec 13 01:50:11.217000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.217000 audit[3107]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5625b3716700 a1=16e97c a2=56257b5442b0 a3=5 items=0 ppid=519 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.217000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:50:11.290019 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.325420 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.325467 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.325482 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.327490 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.327530 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.327545 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.329599 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.329650 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.329666 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.331661 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.331689 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.331704 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.333054 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.333088 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.334427 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.334449 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.336508 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.336552 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.336574 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.337210 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.338593 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.338647 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.340646 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.340677 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.340708 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.342041 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.342085 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.343422 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.343452 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.344123 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.345495 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.345528 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.347568 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.347596 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.347617 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.349646 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.349683 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.349709 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.351028 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.351066 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.352424 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.352459 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.354478 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.354508 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.354524 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.356549 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.356578 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.356599 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.358622 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.358664 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.358684 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.359317 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.361398 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.361451 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.361474 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.363471 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.363505 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.363526 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.365541 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.365580 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.365599 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.367609 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.367656 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.367677 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.369014 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.369053 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.370396 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.370424 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.372457 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.372486 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.372503 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.373161 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.374529 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.374561 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.376596 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.376643 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.376661 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.378012 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.378042 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.379381 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.379430 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.381451 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.381479 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.381500 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.383515 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.383543 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.383575 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.385585 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.385631 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.385658 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.387663 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.387688 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.387742 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.313000 audit[3112]: AVC avc: denied { confidentiality } for pid=3112 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.389047 kernel: Failed to create system directory nfs4 Dec 13 01:50:11.529334 kernel: NFS: Registering the id_resolver key type Dec 13 01:50:11.529520 kernel: Key type id_resolver registered Dec 13 01:50:11.529566 kernel: Key type id_legacy registered Dec 13 01:50:11.313000 audit[3112]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9d3f28c010 a1=208de4 a2=56223914a2b0 a3=5 items=0 ppid=519 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.313000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.542731 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.542772 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.542798 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.542822 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.544291 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.544327 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.546550 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.546584 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.546615 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.548094 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.548142 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.549607 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.549659 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.551143 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.551177 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.552627 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.552659 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.554126 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.554167 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.555612 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.555653 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.557137 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.557170 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.558637 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.558689 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.537000 audit[3113]: AVC avc: denied { confidentiality } for pid=3113 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:50:11.560199 kernel: Failed to create system directory rpcgss Dec 13 01:50:11.537000 audit[3113]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff3acea5010 a1=70af4 a2=55d826eb62b0 a3=5 items=0 ppid=519 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.537000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 01:50:11.572541 nfsidmap[3121]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 01:50:11.575316 nfsidmap[3124]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 01:50:11.582000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:50:11.582000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:50:11.582000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f3d6088580 a2=10 a3=54a179066ed53445 items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.582000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:50:11.582000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:50:11.582000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:50:11.582000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:50:11.582000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f3d6088580 a2=10 a3=54a179066ed53445 items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.582000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:50:11.582000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:50:11.582000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f3d6088580 a2=10 a3=54a179066ed53445 items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.582000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:50:11.611276 env[1199]: time="2024-12-13T01:50:11.611217345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:dc49b22b-b103-4975-a755-4e9e9fa449ba,Namespace:default,Attempt:0,}" Dec 13 01:50:11.702292 systemd-networkd[1028]: cali5ec59c6bf6e: Link UP Dec 13 01:50:11.704647 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:50:11.704705 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 01:50:11.704685 systemd-networkd[1028]: cali5ec59c6bf6e: Gained carrier Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.647 [INFO][3128] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.28-k8s-test--pod--1-eth0 default dc49b22b-b103-4975-a755-4e9e9fa449ba 1179 0 2024-12-13 01:49:54 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.28 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.647 [INFO][3128] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.671 [INFO][3141] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" HandleID="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Workload="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.679 [INFO][3141] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" HandleID="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Workload="10.0.0.28-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051d20), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.28", "pod":"test-pod-1", "timestamp":"2024-12-13 01:50:11.67178328 +0000 UTC"}, Hostname:"10.0.0.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.679 [INFO][3141] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.679 [INFO][3141] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.679 [INFO][3141] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.28' Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.680 [INFO][3141] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.683 [INFO][3141] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.687 [INFO][3141] ipam/ipam.go 489: Trying affinity for 192.168.75.192/26 host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.688 [INFO][3141] ipam/ipam.go 155: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.690 [INFO][3141] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.690 [INFO][3141] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.691 [INFO][3141] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.694 [INFO][3141] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.699 [INFO][3141] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.75.196/26] block=192.168.75.192/26 handle="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.699 [INFO][3141] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.196/26] handle="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" host="10.0.0.28" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.699 [INFO][3141] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.699 [INFO][3141] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.196/26] IPv6=[] ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" HandleID="k8s-pod-network.5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Workload="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.713832 env[1199]: 2024-12-13 01:50:11.700 [INFO][3128] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"dc49b22b-b103-4975-a755-4e9e9fa449ba", ResourceVersion:"1179", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:11.714486 env[1199]: 2024-12-13 01:50:11.700 [INFO][3128] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.75.196/32] ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.714486 env[1199]: 2024-12-13 01:50:11.701 [INFO][3128] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.714486 env[1199]: 2024-12-13 01:50:11.704 [INFO][3128] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.714486 env[1199]: 2024-12-13 01:50:11.705 [INFO][3128] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.28-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"dc49b22b-b103-4975-a755-4e9e9fa449ba", ResourceVersion:"1179", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.28", ContainerID:"5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ca:fa:90:40:a2:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:11.714486 env[1199]: 2024-12-13 01:50:11.712 [INFO][3128] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.28-k8s-test--pod--1-eth0" Dec 13 01:50:11.721000 audit[3164]: NETFILTER_CFG table=filter:92 family=2 entries=34 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:11.721000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffc7ed58b10 a2=0 a3=7ffc7ed58afc items=0 ppid=2147 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.721000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:11.725647 env[1199]: time="2024-12-13T01:50:11.725558886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:11.725647 env[1199]: time="2024-12-13T01:50:11.725599041Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:11.725647 env[1199]: time="2024-12-13T01:50:11.725609561Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:11.725894 env[1199]: time="2024-12-13T01:50:11.725836147Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab pid=3172 runtime=io.containerd.runc.v2 Dec 13 01:50:11.737079 systemd[1]: Started cri-containerd-5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab.scope. Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.746000 audit: BPF prog-id=120 op=LOAD Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3172 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561323433613463393338656533303164356135376633666265643637 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3172 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561323433613463393338656533303164356135376633666265643637 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit: BPF prog-id=121 op=LOAD Dec 13 01:50:11.747000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002171a0 items=0 ppid=3172 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561323433613463393338656533303164356135376633666265643637 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit: BPF prog-id=122 op=LOAD Dec 13 01:50:11.747000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002171e8 items=0 ppid=3172 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561323433613463393338656533303164356135376633666265643637 Dec 13 01:50:11.747000 audit: BPF prog-id=122 op=UNLOAD Dec 13 01:50:11.747000 audit: BPF prog-id=121 op=UNLOAD Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:11.747000 audit: BPF prog-id=123 op=LOAD Dec 13 01:50:11.747000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002175f8 items=0 ppid=3172 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:11.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561323433613463393338656533303164356135376633666265643637 Dec 13 01:50:11.749041 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:50:11.772310 env[1199]: time="2024-12-13T01:50:11.772251092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:dc49b22b-b103-4975-a755-4e9e9fa449ba,Namespace:default,Attempt:0,} returns sandbox id \"5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab\"" Dec 13 01:50:11.774227 env[1199]: time="2024-12-13T01:50:11.774183606Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 01:50:11.956443 kubelet[1452]: E1213 01:50:11.956372 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:12.148365 env[1199]: time="2024-12-13T01:50:12.148291951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:12.150075 env[1199]: time="2024-12-13T01:50:12.150033364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:12.151681 env[1199]: time="2024-12-13T01:50:12.151641579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:12.153300 env[1199]: time="2024-12-13T01:50:12.153227370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:12.154012 env[1199]: time="2024-12-13T01:50:12.153955198Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 01:50:12.155511 env[1199]: time="2024-12-13T01:50:12.155484915Z" level=info msg="CreateContainer within sandbox \"5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 01:50:12.169276 env[1199]: time="2024-12-13T01:50:12.169227013Z" level=info msg="CreateContainer within sandbox \"5a243a4c938ee301d5a57f3fbed67c75c4adfec0f2d2c56d1fe369e62ea5c8ab\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"2fc8bd407dcf66587a36e8d7b26250166e96485ffcdaee35099e0ad0e26166ec\"" Dec 13 01:50:12.169791 env[1199]: time="2024-12-13T01:50:12.169768641Z" level=info msg="StartContainer for \"2fc8bd407dcf66587a36e8d7b26250166e96485ffcdaee35099e0ad0e26166ec\"" Dec 13 01:50:12.185825 systemd[1]: Started cri-containerd-2fc8bd407dcf66587a36e8d7b26250166e96485ffcdaee35099e0ad0e26166ec.scope. Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.196000 audit: BPF prog-id=124 op=LOAD Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3172 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:12.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633862643430376463663636353837613336653864376232363235 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=3172 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:12.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633862643430376463663636353837613336653864376232363235 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit: BPF prog-id=125 op=LOAD Dec 13 01:50:12.197000 audit[3213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003c8020 items=0 ppid=3172 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:12.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633862643430376463663636353837613336653864376232363235 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit: BPF prog-id=126 op=LOAD Dec 13 01:50:12.197000 audit[3213]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003c8068 items=0 ppid=3172 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:12.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633862643430376463663636353837613336653864376232363235 Dec 13 01:50:12.197000 audit: BPF prog-id=126 op=UNLOAD Dec 13 01:50:12.197000 audit: BPF prog-id=125 op=UNLOAD Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:12.197000 audit: BPF prog-id=127 op=LOAD Dec 13 01:50:12.197000 audit[3213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003c8478 items=0 ppid=3172 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:12.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633862643430376463663636353837613336653864376232363235 Dec 13 01:50:12.210925 env[1199]: time="2024-12-13T01:50:12.210769772Z" level=info msg="StartContainer for \"2fc8bd407dcf66587a36e8d7b26250166e96485ffcdaee35099e0ad0e26166ec\" returns successfully" Dec 13 01:50:12.802023 kubelet[1452]: I1213 01:50:12.801954 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.421513918 podStartE2EDuration="18.801893864s" podCreationTimestamp="2024-12-13 01:49:54 +0000 UTC" firstStartedPulling="2024-12-13 01:50:11.773859637 +0000 UTC m=+63.357890996" lastFinishedPulling="2024-12-13 01:50:12.154239573 +0000 UTC m=+63.738270942" observedRunningTime="2024-12-13 01:50:12.801373716 +0000 UTC m=+64.385405085" watchObservedRunningTime="2024-12-13 01:50:12.801893864 +0000 UTC m=+64.385925233" Dec 13 01:50:12.957335 kubelet[1452]: E1213 01:50:12.957266 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:13.536200 systemd-networkd[1028]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 01:50:13.639000 audit[3264]: NETFILTER_CFG table=filter:93 family=2 entries=8 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:13.639000 audit[3264]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffceac036b0 a2=0 a3=7ffceac0369c items=0 ppid=1604 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:13.648000 audit[3264]: NETFILTER_CFG table=nat:94 family=2 entries=58 op=nft_register_chain pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:13.648000 audit[3264]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffceac036b0 a2=0 a3=7ffceac0369c items=0 ppid=1604 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:13.958042 kubelet[1452]: E1213 01:50:13.958001 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:14.959132 kubelet[1452]: E1213 01:50:14.959080 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:15.960006 kubelet[1452]: E1213 01:50:15.959915 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:50:16.961032 kubelet[1452]: E1213 01:50:16.960944 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"