Dec 13 01:59:57.824713 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:59:57.824735 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:59:57.824746 kernel: BIOS-provided physical RAM map: Dec 13 01:59:57.824753 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:59:57.824760 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:59:57.824767 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:59:57.824775 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:59:57.824782 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:59:57.824789 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:59:57.824797 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:59:57.824804 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 01:59:57.824811 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:59:57.824818 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:59:57.824825 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:59:57.824834 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:59:57.824843 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:59:57.824851 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:59:57.824858 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:59:57.824866 kernel: NX (Execute Disable) protection: active Dec 13 01:59:57.824873 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:59:57.824881 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:59:57.824932 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:59:57.824941 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:59:57.824948 kernel: extended physical RAM map: Dec 13 01:59:57.824956 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:59:57.824967 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:59:57.824974 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:59:57.824982 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:59:57.824990 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:59:57.824997 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:59:57.825005 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:59:57.825012 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 01:59:57.825020 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 01:59:57.825028 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 01:59:57.825035 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 01:59:57.825043 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 01:59:57.825052 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:59:57.825060 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:59:57.825067 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:59:57.825075 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:59:57.825087 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:59:57.825095 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:59:57.825103 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:59:57.825112 kernel: efi: EFI v2.70 by EDK II Dec 13 01:59:57.825121 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 01:59:57.825129 kernel: random: crng init done Dec 13 01:59:57.825137 kernel: SMBIOS 2.8 present. Dec 13 01:59:57.825145 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 01:59:57.825153 kernel: Hypervisor detected: KVM Dec 13 01:59:57.825161 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 01:59:57.825168 kernel: kvm-clock: cpu 0, msr 3519b001, primary cpu clock Dec 13 01:59:57.825176 kernel: kvm-clock: using sched offset of 4066128654 cycles Dec 13 01:59:57.825186 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 01:59:57.825194 kernel: tsc: Detected 2794.748 MHz processor Dec 13 01:59:57.825202 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:59:57.825211 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:59:57.825220 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 01:59:57.825229 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:59:57.825237 kernel: Using GB pages for direct mapping Dec 13 01:59:57.825246 kernel: Secure boot disabled Dec 13 01:59:57.825255 kernel: ACPI: Early table checksum verification disabled Dec 13 01:59:57.825266 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 01:59:57.825274 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 01:59:57.825282 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:59:57.825290 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:59:57.825299 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 01:59:57.825316 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:59:57.825325 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:59:57.825333 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:59:57.825342 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:59:57.825352 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 01:59:57.825361 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 01:59:57.825369 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 01:59:57.825377 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 01:59:57.825386 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 01:59:57.825395 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 01:59:57.825404 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 01:59:57.825413 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 01:59:57.825422 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 01:59:57.825433 kernel: No NUMA configuration found Dec 13 01:59:57.825442 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 01:59:57.825450 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 01:59:57.825459 kernel: Zone ranges: Dec 13 01:59:57.825468 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:59:57.825476 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 01:59:57.825485 kernel: Normal empty Dec 13 01:59:57.825493 kernel: Movable zone start for each node Dec 13 01:59:57.825501 kernel: Early memory node ranges Dec 13 01:59:57.825512 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:59:57.825520 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 01:59:57.825528 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 01:59:57.825536 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 01:59:57.825545 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 01:59:57.825553 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 01:59:57.825561 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 01:59:57.825569 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:59:57.825575 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:59:57.825582 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 01:59:57.825590 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:59:57.825596 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 01:59:57.825603 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 01:59:57.825609 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 01:59:57.825616 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 01:59:57.825622 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 01:59:57.825629 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:59:57.825635 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 01:59:57.825641 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 01:59:57.825649 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:59:57.825656 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 01:59:57.825662 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 01:59:57.825669 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:59:57.825675 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 01:59:57.825682 kernel: TSC deadline timer available Dec 13 01:59:57.825688 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 01:59:57.825694 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 01:59:57.825701 kernel: kvm-guest: setup PV sched yield Dec 13 01:59:57.825708 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 01:59:57.825715 kernel: Booting paravirtualized kernel on KVM Dec 13 01:59:57.825726 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:59:57.825735 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 01:59:57.825742 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 01:59:57.825748 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 01:59:57.825755 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 01:59:57.825762 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 01:59:57.825768 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 01:59:57.825775 kernel: kvm-guest: PV spinlocks enabled Dec 13 01:59:57.825782 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:59:57.825789 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 01:59:57.825797 kernel: Policy zone: DMA32 Dec 13 01:59:57.825804 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:59:57.825812 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:59:57.825818 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:59:57.825827 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 01:59:57.825833 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:59:57.825841 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 169308K reserved, 0K cma-reserved) Dec 13 01:59:57.825848 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 01:59:57.825854 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:59:57.825861 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:59:57.825868 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:59:57.825875 kernel: rcu: RCU event tracing is enabled. Dec 13 01:59:57.825882 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 01:59:57.825927 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:59:57.825934 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:59:57.825941 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:59:57.825948 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 01:59:57.825955 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 01:59:57.825961 kernel: Console: colour dummy device 80x25 Dec 13 01:59:57.825968 kernel: printk: console [ttyS0] enabled Dec 13 01:59:57.825975 kernel: ACPI: Core revision 20210730 Dec 13 01:59:57.825982 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 01:59:57.825991 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:59:57.825997 kernel: x2apic enabled Dec 13 01:59:57.826004 kernel: Switched APIC routing to physical x2apic. Dec 13 01:59:57.826011 kernel: kvm-guest: setup PV IPIs Dec 13 01:59:57.826018 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 01:59:57.826025 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 01:59:57.826031 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 01:59:57.826038 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 01:59:57.826045 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 01:59:57.826053 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 01:59:57.826060 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:59:57.826066 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:59:57.826073 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:59:57.826080 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:59:57.826087 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 01:59:57.826094 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 01:59:57.826100 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 01:59:57.826107 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 01:59:57.826116 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:59:57.826122 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:59:57.826129 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:59:57.826136 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:59:57.826144 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 01:59:57.826153 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:59:57.826162 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:59:57.826171 kernel: LSM: Security Framework initializing Dec 13 01:59:57.826179 kernel: SELinux: Initializing. Dec 13 01:59:57.826188 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:59:57.826195 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:59:57.826202 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 01:59:57.826208 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 01:59:57.826215 kernel: ... version: 0 Dec 13 01:59:57.826223 kernel: ... bit width: 48 Dec 13 01:59:57.826231 kernel: ... generic registers: 6 Dec 13 01:59:57.826240 kernel: ... value mask: 0000ffffffffffff Dec 13 01:59:57.826249 kernel: ... max period: 00007fffffffffff Dec 13 01:59:57.826259 kernel: ... fixed-purpose events: 0 Dec 13 01:59:57.826268 kernel: ... event mask: 000000000000003f Dec 13 01:59:57.826277 kernel: signal: max sigframe size: 1776 Dec 13 01:59:57.826284 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:59:57.826291 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:59:57.826297 kernel: x86: Booting SMP configuration: Dec 13 01:59:57.826313 kernel: .... node #0, CPUs: #1 Dec 13 01:59:57.826320 kernel: kvm-clock: cpu 1, msr 3519b041, secondary cpu clock Dec 13 01:59:57.826327 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 01:59:57.826336 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 01:59:57.826343 kernel: #2 Dec 13 01:59:57.826350 kernel: kvm-clock: cpu 2, msr 3519b081, secondary cpu clock Dec 13 01:59:57.826359 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 01:59:57.826368 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 01:59:57.826376 kernel: #3 Dec 13 01:59:57.826385 kernel: kvm-clock: cpu 3, msr 3519b0c1, secondary cpu clock Dec 13 01:59:57.826393 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 01:59:57.826402 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 01:59:57.826410 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 01:59:57.826419 kernel: smpboot: Max logical packages: 1 Dec 13 01:59:57.826426 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 01:59:57.826433 kernel: devtmpfs: initialized Dec 13 01:59:57.826439 kernel: x86/mm: Memory block size: 128MB Dec 13 01:59:57.826448 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 01:59:57.826457 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 01:59:57.826466 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 01:59:57.826474 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 01:59:57.826483 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 01:59:57.826494 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:59:57.826503 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 01:59:57.826511 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:59:57.826520 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:59:57.826529 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:59:57.826538 kernel: audit: type=2000 audit(1734055197.630:1): state=initialized audit_enabled=0 res=1 Dec 13 01:59:57.826546 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:59:57.826555 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:59:57.826563 kernel: cpuidle: using governor menu Dec 13 01:59:57.826574 kernel: ACPI: bus type PCI registered Dec 13 01:59:57.826583 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:59:57.826592 kernel: dca service started, version 1.12.1 Dec 13 01:59:57.826601 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 01:59:57.826609 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 01:59:57.826618 kernel: PCI: Using configuration type 1 for base access Dec 13 01:59:57.826627 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:59:57.826636 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:59:57.826644 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:59:57.826655 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:59:57.826663 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:59:57.826673 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:59:57.826681 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:59:57.826690 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:59:57.826699 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:59:57.826708 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:59:57.826716 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:59:57.826725 kernel: ACPI: Interpreter enabled Dec 13 01:59:57.826736 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 01:59:57.826744 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:59:57.826753 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:59:57.826762 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 01:59:57.826770 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 01:59:57.826938 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 01:59:57.827037 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 01:59:57.827137 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 01:59:57.827150 kernel: PCI host bridge to bus 0000:00 Dec 13 01:59:57.827252 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 01:59:57.827352 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 01:59:57.827440 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 01:59:57.827524 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 01:59:57.827604 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 01:59:57.827693 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 01:59:57.827777 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 01:59:57.827909 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 01:59:57.828023 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 01:59:57.828125 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 01:59:57.828219 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 01:59:57.828323 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 01:59:57.828416 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 01:59:57.828529 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 01:59:57.828622 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 01:59:57.828737 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 01:59:57.828822 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 01:59:57.828908 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 01:59:57.828986 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 01:59:57.829060 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 01:59:57.829128 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 01:59:57.829198 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 01:59:57.829288 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 01:59:57.829370 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 01:59:57.829453 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 01:59:57.829538 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 01:59:57.829608 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 01:59:57.829680 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 01:59:57.829747 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 01:59:57.829825 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 01:59:57.829915 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 01:59:57.829986 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 01:59:57.830065 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 01:59:57.830135 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 01:59:57.830145 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 01:59:57.830152 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 01:59:57.830159 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 01:59:57.830166 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 01:59:57.830173 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 01:59:57.830179 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 01:59:57.830188 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 01:59:57.830195 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 01:59:57.830202 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 01:59:57.830209 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 01:59:57.830216 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 01:59:57.830222 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 01:59:57.830229 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 01:59:57.830237 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 01:59:57.830246 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 01:59:57.830264 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 01:59:57.830270 kernel: iommu: Default domain type: Translated Dec 13 01:59:57.830277 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:59:57.830382 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 01:59:57.830529 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 01:59:57.830634 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 01:59:57.830648 kernel: vgaarb: loaded Dec 13 01:59:57.830657 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:59:57.830666 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:59:57.830679 kernel: PTP clock support registered Dec 13 01:59:57.830688 kernel: Registered efivars operations Dec 13 01:59:57.830696 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:59:57.830713 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 01:59:57.830721 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 01:59:57.830728 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 01:59:57.830736 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 01:59:57.830745 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 01:59:57.830754 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 01:59:57.830766 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 01:59:57.830775 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 01:59:57.830784 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 01:59:57.830793 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 01:59:57.830801 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:59:57.830810 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:59:57.830819 kernel: pnp: PnP ACPI init Dec 13 01:59:57.830934 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 01:59:57.830948 kernel: pnp: PnP ACPI: found 6 devices Dec 13 01:59:57.830956 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:59:57.830963 kernel: NET: Registered PF_INET protocol family Dec 13 01:59:57.830970 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:59:57.830977 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 01:59:57.830984 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:59:57.830990 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 01:59:57.830997 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 01:59:57.831006 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 01:59:57.831013 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:59:57.831020 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:59:57.831026 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:59:57.831033 kernel: NET: Registered PF_XDP protocol family Dec 13 01:59:57.831105 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 01:59:57.831177 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 01:59:57.831240 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 01:59:57.831311 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 01:59:57.831377 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 01:59:57.831437 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 01:59:57.831498 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 01:59:57.831559 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 01:59:57.831568 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:59:57.831575 kernel: Initialise system trusted keyrings Dec 13 01:59:57.831582 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 01:59:57.831589 kernel: Key type asymmetric registered Dec 13 01:59:57.831597 kernel: Asymmetric key parser 'x509' registered Dec 13 01:59:57.831604 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:59:57.831620 kernel: io scheduler mq-deadline registered Dec 13 01:59:57.831628 kernel: io scheduler kyber registered Dec 13 01:59:57.831635 kernel: io scheduler bfq registered Dec 13 01:59:57.831642 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:59:57.831650 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 01:59:57.831657 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 01:59:57.831664 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 01:59:57.831673 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:59:57.831680 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:59:57.831688 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 01:59:57.831695 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 01:59:57.831702 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 01:59:57.831778 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 01:59:57.831789 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 01:59:57.831849 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 01:59:57.831930 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T01:59:57 UTC (1734055197) Dec 13 01:59:57.831994 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 01:59:57.832003 kernel: efifb: probing for efifb Dec 13 01:59:57.832010 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 01:59:57.832018 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 01:59:57.832025 kernel: efifb: scrolling: redraw Dec 13 01:59:57.832032 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:59:57.832039 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 01:59:57.832047 kernel: fb0: EFI VGA frame buffer device Dec 13 01:59:57.832056 kernel: pstore: Registered efi as persistent store backend Dec 13 01:59:57.832063 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:59:57.832070 kernel: Segment Routing with IPv6 Dec 13 01:59:57.832079 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:59:57.832086 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:59:57.832093 kernel: Key type dns_resolver registered Dec 13 01:59:57.832101 kernel: IPI shorthand broadcast: enabled Dec 13 01:59:57.832109 kernel: sched_clock: Marking stable (416007546, 128015804)->(588193804, -44170454) Dec 13 01:59:57.832116 kernel: registered taskstats version 1 Dec 13 01:59:57.832123 kernel: Loading compiled-in X.509 certificates Dec 13 01:59:57.832131 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:59:57.832138 kernel: Key type .fscrypt registered Dec 13 01:59:57.832145 kernel: Key type fscrypt-provisioning registered Dec 13 01:59:57.832152 kernel: pstore: Using crash dump compression: deflate Dec 13 01:59:57.832160 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:59:57.832167 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:59:57.832175 kernel: ima: No architecture policies found Dec 13 01:59:57.832182 kernel: clk: Disabling unused clocks Dec 13 01:59:57.832189 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:59:57.832198 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:59:57.832205 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:59:57.832212 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:59:57.832219 kernel: Run /init as init process Dec 13 01:59:57.832228 kernel: with arguments: Dec 13 01:59:57.832235 kernel: /init Dec 13 01:59:57.832242 kernel: with environment: Dec 13 01:59:57.832249 kernel: HOME=/ Dec 13 01:59:57.832256 kernel: TERM=linux Dec 13 01:59:57.832263 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:59:57.832272 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:59:57.832282 systemd[1]: Detected virtualization kvm. Dec 13 01:59:57.832291 systemd[1]: Detected architecture x86-64. Dec 13 01:59:57.832298 systemd[1]: Running in initrd. Dec 13 01:59:57.832315 systemd[1]: No hostname configured, using default hostname. Dec 13 01:59:57.832323 systemd[1]: Hostname set to . Dec 13 01:59:57.832331 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:59:57.832339 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:59:57.832346 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:59:57.832354 systemd[1]: Reached target cryptsetup.target. Dec 13 01:59:57.832361 systemd[1]: Reached target paths.target. Dec 13 01:59:57.832370 systemd[1]: Reached target slices.target. Dec 13 01:59:57.832377 systemd[1]: Reached target swap.target. Dec 13 01:59:57.832385 systemd[1]: Reached target timers.target. Dec 13 01:59:57.832393 systemd[1]: Listening on iscsid.socket. Dec 13 01:59:57.832401 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:59:57.832409 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:59:57.832416 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:59:57.832425 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:59:57.832433 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:59:57.832441 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:59:57.832448 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:59:57.832456 systemd[1]: Reached target sockets.target. Dec 13 01:59:57.832464 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:59:57.832471 systemd[1]: Finished network-cleanup.service. Dec 13 01:59:57.832479 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:59:57.832487 systemd[1]: Starting systemd-journald.service... Dec 13 01:59:57.832496 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:59:57.832503 systemd[1]: Starting systemd-resolved.service... Dec 13 01:59:57.832511 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:59:57.832519 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:59:57.832526 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:59:57.832534 kernel: audit: type=1130 audit(1734055197.824:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.832542 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:59:57.832550 kernel: audit: type=1130 audit(1734055197.829:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.832561 systemd-journald[197]: Journal started Dec 13 01:59:57.832598 systemd-journald[197]: Runtime Journal (/run/log/journal/159e473616ef45bfac2826ec6b3f8def) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:59:57.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.833523 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 01:59:57.836121 systemd[1]: Started systemd-journald.service. Dec 13 01:59:57.836140 kernel: audit: type=1130 audit(1734055197.835:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.839034 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:59:57.840707 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:59:57.848014 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:59:57.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.851902 kernel: audit: type=1130 audit(1734055197.847:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.853458 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:59:57.859823 kernel: audit: type=1130 audit(1734055197.853:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.854990 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:59:57.861363 systemd-resolved[199]: Positive Trust Anchors: Dec 13 01:59:57.861378 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:59:57.861405 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:59:57.863565 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 01:59:57.873397 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:59:57.873427 kernel: audit: type=1130 audit(1734055197.872:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.864233 systemd[1]: Started systemd-resolved.service. Dec 13 01:59:57.877870 dracut-cmdline[216]: dracut-dracut-053 Dec 13 01:59:57.877870 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:59:57.883940 kernel: Bridge firewalling registered Dec 13 01:59:57.873464 systemd[1]: Reached target nss-lookup.target. Dec 13 01:59:57.879293 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 01:59:57.899910 kernel: SCSI subsystem initialized Dec 13 01:59:57.911837 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:59:57.911868 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:59:57.911878 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:59:57.914591 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 01:59:57.915766 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:59:57.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.918227 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:59:57.922143 kernel: audit: type=1130 audit(1734055197.916:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.925651 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:59:57.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.930935 kernel: audit: type=1130 audit(1734055197.924:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:57.938907 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:59:57.954916 kernel: iscsi: registered transport (tcp) Dec 13 01:59:57.975910 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:59:57.975934 kernel: QLogic iSCSI HBA Driver Dec 13 01:59:58.005748 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:59:58.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:58.008074 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:59:58.012059 kernel: audit: type=1130 audit(1734055198.006:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:58.052910 kernel: raid6: avx2x4 gen() 29938 MB/s Dec 13 01:59:58.069908 kernel: raid6: avx2x4 xor() 7238 MB/s Dec 13 01:59:58.086908 kernel: raid6: avx2x2 gen() 29037 MB/s Dec 13 01:59:58.103907 kernel: raid6: avx2x2 xor() 18106 MB/s Dec 13 01:59:58.120907 kernel: raid6: avx2x1 gen() 25149 MB/s Dec 13 01:59:58.137909 kernel: raid6: avx2x1 xor() 14666 MB/s Dec 13 01:59:58.159907 kernel: raid6: sse2x4 gen() 13886 MB/s Dec 13 01:59:58.176908 kernel: raid6: sse2x4 xor() 6930 MB/s Dec 13 01:59:58.193907 kernel: raid6: sse2x2 gen() 16103 MB/s Dec 13 01:59:58.210908 kernel: raid6: sse2x2 xor() 9832 MB/s Dec 13 01:59:58.227908 kernel: raid6: sse2x1 gen() 12370 MB/s Dec 13 01:59:58.245305 kernel: raid6: sse2x1 xor() 7754 MB/s Dec 13 01:59:58.245323 kernel: raid6: using algorithm avx2x4 gen() 29938 MB/s Dec 13 01:59:58.245333 kernel: raid6: .... xor() 7238 MB/s, rmw enabled Dec 13 01:59:58.246009 kernel: raid6: using avx2x2 recovery algorithm Dec 13 01:59:58.257913 kernel: xor: automatically using best checksumming function avx Dec 13 01:59:58.346915 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:59:58.355153 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:59:58.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:58.356000 audit: BPF prog-id=7 op=LOAD Dec 13 01:59:58.356000 audit: BPF prog-id=8 op=LOAD Dec 13 01:59:58.357754 systemd[1]: Starting systemd-udevd.service... Dec 13 01:59:58.369771 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 01:59:58.373225 systemd[1]: Started systemd-udevd.service. Dec 13 01:59:58.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:58.378305 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:59:58.385247 dracut-pre-trigger[414]: rd.md=0: removing MD RAID activation Dec 13 01:59:58.407843 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:59:58.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:58.409591 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:59:58.443631 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:59:58.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:58.469903 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 01:59:58.487753 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 01:59:58.487773 kernel: GPT:9289727 != 19775487 Dec 13 01:59:58.487784 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 01:59:58.487796 kernel: GPT:9289727 != 19775487 Dec 13 01:59:58.487807 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 01:59:58.487818 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:59:58.487829 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:59:58.487840 kernel: libata version 3.00 loaded. Dec 13 01:59:58.487850 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:59:58.487861 kernel: AES CTR mode by8 optimization enabled Dec 13 01:59:58.495910 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 01:59:58.527092 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 01:59:58.527106 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 01:59:58.527192 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 01:59:58.527266 kernel: scsi host0: ahci Dec 13 01:59:58.527363 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (466) Dec 13 01:59:58.527372 kernel: scsi host1: ahci Dec 13 01:59:58.527463 kernel: scsi host2: ahci Dec 13 01:59:58.527546 kernel: scsi host3: ahci Dec 13 01:59:58.527880 kernel: scsi host4: ahci Dec 13 01:59:58.529941 kernel: scsi host5: ahci Dec 13 01:59:58.530043 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 01:59:58.530053 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 01:59:58.530061 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 01:59:58.530072 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 01:59:58.530081 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 01:59:58.530089 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 01:59:58.509407 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:59:58.520520 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:59:58.528775 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:59:58.534381 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:59:58.537057 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:59:58.539807 systemd[1]: Starting disk-uuid.service... Dec 13 01:59:58.546552 disk-uuid[549]: Primary Header is updated. Dec 13 01:59:58.546552 disk-uuid[549]: Secondary Entries is updated. Dec 13 01:59:58.546552 disk-uuid[549]: Secondary Header is updated. Dec 13 01:59:58.550161 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:59:58.552453 kernel: GPT:disk_guids don't match. Dec 13 01:59:58.552482 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 01:59:58.552496 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:59:58.556906 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:59:58.840569 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 01:59:58.840628 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 01:59:58.840640 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 01:59:58.840650 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 01:59:58.840659 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 01:59:58.841919 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 01:59:58.842981 kernel: ata3.00: applying bridge limits Dec 13 01:59:58.843920 kernel: ata3.00: configured for UDMA/100 Dec 13 01:59:58.843938 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 01:59:58.844923 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 01:59:58.873905 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 01:59:58.891401 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:59:58.891413 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 01:59:59.578913 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:59:59.579237 disk-uuid[551]: The operation has completed successfully. Dec 13 01:59:59.601859 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:59:59.601980 systemd[1]: Finished disk-uuid.service. Dec 13 01:59:59.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.611203 systemd[1]: Starting verity-setup.service... Dec 13 01:59:59.623909 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 01:59:59.642320 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:59:59.644589 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:59:59.647137 systemd[1]: Finished verity-setup.service. Dec 13 01:59:59.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.704807 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:59:59.706276 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:59:59.705628 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:59:59.706274 systemd[1]: Starting ignition-setup.service... Dec 13 01:59:59.707451 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:59:59.719012 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:59:59.719060 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:59:59.719079 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:59:59.727180 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:59:59.734986 systemd[1]: Finished ignition-setup.service. Dec 13 01:59:59.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.736555 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:59:59.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.770000 audit: BPF prog-id=9 op=LOAD Dec 13 01:59:59.769761 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:59:59.771180 ignition[664]: Ignition 2.14.0 Dec 13 01:59:59.771187 ignition[664]: Stage: fetch-offline Dec 13 01:59:59.773662 systemd[1]: Starting systemd-networkd.service... Dec 13 01:59:59.771230 ignition[664]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:59:59.771237 ignition[664]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:59:59.771356 ignition[664]: parsed url from cmdline: "" Dec 13 01:59:59.771359 ignition[664]: no config URL provided Dec 13 01:59:59.771363 ignition[664]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:59:59.771369 ignition[664]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:59:59.771385 ignition[664]: op(1): [started] loading QEMU firmware config module Dec 13 01:59:59.781783 unknown[664]: fetched base config from "system" Dec 13 01:59:59.771391 ignition[664]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 01:59:59.781795 unknown[664]: fetched user config from "qemu" Dec 13 01:59:59.775295 ignition[664]: op(1): [finished] loading QEMU firmware config module Dec 13 01:59:59.776993 ignition[664]: parsing config with SHA512: cc2ad21bf90cb3b57d96b642f662162462b4a2aee6aed81dbcfce3bda4bb6adf4d863e18369b21b35bfb7d1a0c2b3ea24f9529e8df60b7b00175005c1054b597 Dec 13 01:59:59.787003 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:59:59.785126 ignition[664]: fetch-offline: fetch-offline passed Dec 13 01:59:59.785208 ignition[664]: Ignition finished successfully Dec 13 01:59:59.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.802035 systemd-networkd[733]: lo: Link UP Dec 13 01:59:59.802044 systemd-networkd[733]: lo: Gained carrier Dec 13 01:59:59.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.802437 systemd-networkd[733]: Enumeration completed Dec 13 01:59:59.802545 systemd[1]: Started systemd-networkd.service. Dec 13 01:59:59.802633 systemd-networkd[733]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:59:59.803607 systemd-networkd[733]: eth0: Link UP Dec 13 01:59:59.803610 systemd-networkd[733]: eth0: Gained carrier Dec 13 01:59:59.804053 systemd[1]: Reached target network.target. Dec 13 01:59:59.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.805549 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 01:59:59.815007 ignition[735]: Ignition 2.14.0 Dec 13 01:59:59.806196 systemd[1]: Starting ignition-kargs.service... Dec 13 01:59:59.817201 iscsid[744]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:59:59.817201 iscsid[744]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:59:59.817201 iscsid[744]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:59:59.817201 iscsid[744]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:59:59.817201 iscsid[744]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:59:59.817201 iscsid[744]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:59:59.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.815013 ignition[735]: Stage: kargs Dec 13 01:59:59.807541 systemd[1]: Starting iscsiuio.service... Dec 13 01:59:59.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.816174 ignition[735]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:59:59.811385 systemd[1]: Started iscsiuio.service. Dec 13 01:59:59.816188 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:59:59.812905 systemd[1]: Starting iscsid.service... Dec 13 01:59:59.816811 ignition[735]: kargs: kargs passed Dec 13 01:59:59.817192 systemd[1]: Started iscsid.service. Dec 13 01:59:59.816843 ignition[735]: Ignition finished successfully Dec 13 01:59:59.818546 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:59:59.833485 ignition[753]: Ignition 2.14.0 Dec 13 01:59:59.820205 systemd[1]: Finished ignition-kargs.service. Dec 13 01:59:59.833490 ignition[753]: Stage: disks Dec 13 01:59:59.822965 systemd-networkd[733]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:59:59.833575 ignition[753]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:59:59.827399 systemd[1]: Starting ignition-disks.service... Dec 13 01:59:59.833584 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:59:59.833174 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:59:59.834224 ignition[753]: disks: disks passed Dec 13 01:59:59.836908 systemd[1]: Finished ignition-disks.service. Dec 13 01:59:59.834264 ignition[753]: Ignition finished successfully Dec 13 01:59:59.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.850664 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:59:59.852441 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:59:59.854053 systemd[1]: Reached target local-fs.target. Dec 13 01:59:59.855591 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:59:59.857209 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:59:59.858943 systemd[1]: Reached target remote-fs.target. Dec 13 01:59:59.860470 systemd[1]: Reached target sysinit.target. Dec 13 01:59:59.861960 systemd[1]: Reached target basic.target. Dec 13 01:59:59.864003 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:59:59.870692 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:59:59.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.872827 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:59:59.882118 systemd-fsck[766]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 01:59:59.887433 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:59:59.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.888288 systemd[1]: Mounting sysroot.mount... Dec 13 01:59:59.894912 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:59:59.894974 systemd[1]: Mounted sysroot.mount. Dec 13 01:59:59.895083 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:59:59.897848 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:59:59.898165 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 01:59:59.898196 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:59:59.898214 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:59:59.905985 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:59:59.907366 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:59:59.912692 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:59:59.916792 initrd-setup-root[784]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:59:59.919475 initrd-setup-root[792]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:59:59.922557 initrd-setup-root[800]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:59:59.945686 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:59:59.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.948000 systemd[1]: Starting ignition-mount.service... Dec 13 01:59:59.950134 systemd[1]: Starting sysroot-boot.service... Dec 13 01:59:59.952673 bash[817]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 01:59:59.960727 ignition[819]: INFO : Ignition 2.14.0 Dec 13 01:59:59.960727 ignition[819]: INFO : Stage: mount Dec 13 01:59:59.962315 ignition[819]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:59:59.962315 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:59:59.964715 ignition[819]: INFO : mount: mount passed Dec 13 01:59:59.964715 ignition[819]: INFO : Ignition finished successfully Dec 13 01:59:59.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:59.965691 systemd[1]: Finished ignition-mount.service. Dec 13 01:59:59.967556 systemd[1]: Finished sysroot-boot.service. Dec 13 01:59:59.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:00.654843 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:00:00.661546 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (827) Dec 13 02:00:00.661580 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:00:00.661590 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:00:00.662343 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:00:00.665951 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:00:00.667459 systemd[1]: Starting ignition-files.service... Dec 13 02:00:00.679757 ignition[847]: INFO : Ignition 2.14.0 Dec 13 02:00:00.679757 ignition[847]: INFO : Stage: files Dec 13 02:00:00.681439 ignition[847]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:00.681439 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:00.681439 ignition[847]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:00:00.684823 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:00:00.684823 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:00:00.684823 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:00:00.689174 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:00:00.689174 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:00:00.689174 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:00:00.685470 unknown[847]: wrote ssh authorized keys file for user: core Dec 13 02:00:01.063632 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 02:00:01.383748 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:00:01.383748 ignition[847]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 02:00:01.387816 ignition[847]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:00:01.387816 ignition[847]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:00:01.387816 ignition[847]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 02:00:01.387816 ignition[847]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:00:01.387816 ignition[847]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:00:01.394267 systemd-networkd[733]: eth0: Gained IPv6LL Dec 13 02:00:01.407844 ignition[847]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:00:01.409405 ignition[847]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:00:01.409405 ignition[847]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:00:01.409405 ignition[847]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:00:01.409405 ignition[847]: INFO : files: files passed Dec 13 02:00:01.409405 ignition[847]: INFO : Ignition finished successfully Dec 13 02:00:01.416419 systemd[1]: Finished ignition-files.service. Dec 13 02:00:01.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.418778 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:00:01.419688 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:00:01.420212 systemd[1]: Starting ignition-quench.service... Dec 13 02:00:01.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.423684 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:00:01.426104 initrd-setup-root-after-ignition[872]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 02:00:01.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.423767 systemd[1]: Finished ignition-quench.service. Dec 13 02:00:01.430951 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:00:01.426100 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:00:01.427184 systemd[1]: Reached target ignition-complete.target. Dec 13 02:00:01.430003 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:00:01.444168 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:00:01.444254 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:00:01.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.446078 systemd[1]: Reached target initrd-fs.target. Dec 13 02:00:01.447567 systemd[1]: Reached target initrd.target. Dec 13 02:00:01.448354 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:00:01.448919 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:00:01.458997 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:00:01.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.459699 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:00:01.467527 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:00:01.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.467655 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:00:01.499755 ignition[887]: INFO : Ignition 2.14.0 Dec 13 02:00:01.499755 ignition[887]: INFO : Stage: umount Dec 13 02:00:01.499755 ignition[887]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:01.499755 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:01.499755 ignition[887]: INFO : umount: umount passed Dec 13 02:00:01.499755 ignition[887]: INFO : Ignition finished successfully Dec 13 02:00:01.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.467844 systemd[1]: Stopped target timers.target. Dec 13 02:00:01.468172 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:00:01.509000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:00:01.468264 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:00:01.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.468421 systemd[1]: Stopped target initrd.target. Dec 13 02:00:01.468514 systemd[1]: Stopped target basic.target. Dec 13 02:00:01.468680 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:00:01.468847 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:00:01.469187 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:00:01.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.469368 systemd[1]: Stopped target remote-fs.target. Dec 13 02:00:01.469528 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:00:01.469703 systemd[1]: Stopped target sysinit.target. Dec 13 02:00:01.469865 systemd[1]: Stopped target local-fs.target. Dec 13 02:00:01.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470212 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:00:01.470378 systemd[1]: Stopped target swap.target. Dec 13 02:00:01.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470520 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:00:01.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470599 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:00:01.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470765 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:00:01.470858 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:00:01.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.470948 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:00:01.471080 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:00:01.471160 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:00:01.471436 systemd[1]: Stopped target paths.target. Dec 13 02:00:01.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.471526 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:00:01.474926 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:00:01.475047 systemd[1]: Stopped target slices.target. Dec 13 02:00:01.475209 systemd[1]: Stopped target sockets.target. Dec 13 02:00:01.475366 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:00:01.475424 systemd[1]: Closed iscsid.socket. Dec 13 02:00:01.475545 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:00:01.475605 systemd[1]: Closed iscsiuio.socket. Dec 13 02:00:01.475719 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:00:01.475800 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:00:01.476248 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:00:01.476326 systemd[1]: Stopped ignition-files.service. Dec 13 02:00:01.477167 systemd[1]: Stopping ignition-mount.service... Dec 13 02:00:01.477514 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:00:01.477604 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:00:01.478367 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:00:01.478699 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:00:01.478811 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:00:01.479014 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:00:01.479119 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:00:01.481491 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:00:01.481558 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:00:01.489152 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:00:01.489252 systemd[1]: Stopped ignition-mount.service. Dec 13 02:00:01.489563 systemd[1]: Stopped target network.target. Dec 13 02:00:01.489661 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:00:01.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.489693 systemd[1]: Stopped ignition-disks.service. Dec 13 02:00:01.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:01.489860 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:00:01.489898 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:00:01.490133 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:00:01.490196 systemd[1]: Stopped ignition-setup.service. Dec 13 02:00:01.490861 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:00:01.491218 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:00:01.492757 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:00:01.500850 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:00:01.500961 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:00:01.504977 systemd-networkd[733]: eth0: DHCPv6 lease lost Dec 13 02:00:01.577000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:00:01.505898 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:00:01.505974 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:00:01.507616 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:00:01.507639 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:00:01.509821 systemd[1]: Stopping network-cleanup.service... Dec 13 02:00:01.511067 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:00:01.511108 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:00:01.511206 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:00:01.511235 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:00:01.512683 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:00:01.512713 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:00:01.514403 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:00:01.517781 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:00:01.520727 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:00:01.520812 systemd[1]: Stopped network-cleanup.service. Dec 13 02:00:01.524163 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:00:01.524278 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:00:01.525791 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:00:01.525819 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:00:01.527358 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:00:01.527412 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:00:01.529088 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:00:01.529120 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:00:01.530604 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:00:01.530633 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:00:01.532353 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:00:01.603712 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 02:00:01.603741 iscsid[744]: iscsid shutting down. Dec 13 02:00:01.532380 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:00:01.534470 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:00:01.535564 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:00:01.535598 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:00:01.539880 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:00:01.539956 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:00:01.564184 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:00:01.564266 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:00:01.565139 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:00:01.566854 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:00:01.566885 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:00:01.568243 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:00:01.583617 systemd[1]: Switching root. Dec 13 02:00:01.611266 systemd-journald[197]: Journal stopped Dec 13 02:00:04.069104 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:00:04.069158 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:00:04.069169 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:00:04.069178 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:00:04.069188 kernel: SELinux: policy capability open_perms=1 Dec 13 02:00:04.069197 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:00:04.069211 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:00:04.069220 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:00:04.069230 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:00:04.069239 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:00:04.069248 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:00:04.069258 systemd[1]: Successfully loaded SELinux policy in 38.569ms. Dec 13 02:00:04.069278 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.839ms. Dec 13 02:00:04.069291 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:00:04.069303 systemd[1]: Detected virtualization kvm. Dec 13 02:00:04.069315 systemd[1]: Detected architecture x86-64. Dec 13 02:00:04.069324 systemd[1]: Detected first boot. Dec 13 02:00:04.069334 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:00:04.069344 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:00:04.069354 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:00:04.069365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:00:04.069375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:00:04.069388 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:00:04.069399 kernel: kauditd_printk_skb: 79 callbacks suppressed Dec 13 02:00:04.069408 kernel: audit: type=1334 audit(1734055203.928:83): prog-id=12 op=LOAD Dec 13 02:00:04.069417 kernel: audit: type=1334 audit(1734055203.928:84): prog-id=3 op=UNLOAD Dec 13 02:00:04.069426 kernel: audit: type=1334 audit(1734055203.930:85): prog-id=13 op=LOAD Dec 13 02:00:04.069436 kernel: audit: type=1334 audit(1734055203.932:86): prog-id=14 op=LOAD Dec 13 02:00:04.069445 kernel: audit: type=1334 audit(1734055203.932:87): prog-id=4 op=UNLOAD Dec 13 02:00:04.069454 kernel: audit: type=1334 audit(1734055203.932:88): prog-id=5 op=UNLOAD Dec 13 02:00:04.069464 kernel: audit: type=1334 audit(1734055203.934:89): prog-id=15 op=LOAD Dec 13 02:00:04.069474 kernel: audit: type=1334 audit(1734055203.934:90): prog-id=12 op=UNLOAD Dec 13 02:00:04.069484 kernel: audit: type=1334 audit(1734055203.936:91): prog-id=16 op=LOAD Dec 13 02:00:04.069494 kernel: audit: type=1334 audit(1734055203.938:92): prog-id=17 op=LOAD Dec 13 02:00:04.069503 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:00:04.069513 systemd[1]: Stopped iscsiuio.service. Dec 13 02:00:04.069523 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:00:04.069534 systemd[1]: Stopped iscsid.service. Dec 13 02:00:04.069545 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:00:04.069555 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:00:04.069565 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:00:04.069575 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:00:04.069585 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:00:04.069595 systemd[1]: Created slice system-getty.slice. Dec 13 02:00:04.069605 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:00:04.069616 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:00:04.069627 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:00:04.069638 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:00:04.069648 systemd[1]: Created slice user.slice. Dec 13 02:00:04.069657 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:00:04.069667 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:00:04.069678 systemd[1]: Set up automount boot.automount. Dec 13 02:00:04.069688 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:00:04.069698 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:00:04.069708 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:00:04.069719 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:00:04.069729 systemd[1]: Reached target integritysetup.target. Dec 13 02:00:04.069740 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:00:04.069751 systemd[1]: Reached target remote-fs.target. Dec 13 02:00:04.069761 systemd[1]: Reached target slices.target. Dec 13 02:00:04.069771 systemd[1]: Reached target swap.target. Dec 13 02:00:04.069782 systemd[1]: Reached target torcx.target. Dec 13 02:00:04.069792 systemd[1]: Reached target veritysetup.target. Dec 13 02:00:04.069803 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:00:04.069812 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:00:04.069822 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:00:04.069833 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:00:04.069843 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:00:04.069853 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:00:04.069866 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:00:04.069877 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:00:04.069900 systemd[1]: Mounting media.mount... Dec 13 02:00:04.069911 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:04.069920 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:00:04.069930 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:00:04.069940 systemd[1]: Mounting tmp.mount... Dec 13 02:00:04.069950 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:00:04.069961 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:04.069971 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:00:04.069983 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:00:04.069993 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:04.070003 systemd[1]: Starting modprobe@drm.service... Dec 13 02:00:04.070014 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:04.070023 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:00:04.070034 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:04.070045 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:00:04.070055 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:00:04.070065 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:00:04.070077 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:00:04.070086 kernel: loop: module loaded Dec 13 02:00:04.070096 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:00:04.070106 systemd[1]: Stopped systemd-journald.service. Dec 13 02:00:04.070116 kernel: fuse: init (API version 7.34) Dec 13 02:00:04.070126 systemd[1]: Starting systemd-journald.service... Dec 13 02:00:04.070143 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:00:04.070154 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:00:04.070164 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:00:04.070175 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:00:04.070185 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:00:04.070195 systemd[1]: Stopped verity-setup.service. Dec 13 02:00:04.070205 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:04.070218 systemd-journald[1002]: Journal started Dec 13 02:00:04.070254 systemd-journald[1002]: Runtime Journal (/run/log/journal/159e473616ef45bfac2826ec6b3f8def) is 6.0M, max 48.4M, 42.4M free. Dec 13 02:00:01.660000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:00:01.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:00:01.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:00:01.840000 audit: BPF prog-id=10 op=LOAD Dec 13 02:00:01.840000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:00:01.840000 audit: BPF prog-id=11 op=LOAD Dec 13 02:00:01.840000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:00:01.869000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:00:01.869000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:01.869000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:00:01.871000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:00:01.871000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155989 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:01.871000 audit: CWD cwd="/" Dec 13 02:00:01.871000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:01.871000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:01.871000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:00:03.928000 audit: BPF prog-id=12 op=LOAD Dec 13 02:00:03.928000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:00:03.930000 audit: BPF prog-id=13 op=LOAD Dec 13 02:00:03.932000 audit: BPF prog-id=14 op=LOAD Dec 13 02:00:03.932000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:00:03.932000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:00:03.934000 audit: BPF prog-id=15 op=LOAD Dec 13 02:00:03.934000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:00:03.936000 audit: BPF prog-id=16 op=LOAD Dec 13 02:00:03.938000 audit: BPF prog-id=17 op=LOAD Dec 13 02:00:03.938000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:00:03.938000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:00:03.939000 audit: BPF prog-id=18 op=LOAD Dec 13 02:00:03.939000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:00:03.939000 audit: BPF prog-id=19 op=LOAD Dec 13 02:00:03.939000 audit: BPF prog-id=20 op=LOAD Dec 13 02:00:03.939000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:00:03.939000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:00:03.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:03.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:03.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:03.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:03.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:03.950000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:00:04.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.049000 audit: BPF prog-id=21 op=LOAD Dec 13 02:00:04.050000 audit: BPF prog-id=22 op=LOAD Dec 13 02:00:04.050000 audit: BPF prog-id=23 op=LOAD Dec 13 02:00:04.050000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:00:04.050000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:00:04.067000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:00:04.067000 audit[1002]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc44f0b130 a2=4000 a3=7ffc44f0b1cc items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:04.067000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:00:04.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:03.928111 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:00:01.869063 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:00:03.928120 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 02:00:01.869314 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:00:03.941076 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:00:01.869330 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:00:01.869355 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:00:01.869364 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:00:01.869391 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:00:01.869402 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:00:01.869573 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:00:01.869606 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:00:01.869617 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:00:01.870147 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:00:01.870176 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:00:01.870200 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:00:01.870214 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:00:01.870228 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:00:01.870240 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:00:03.679263 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:03.679505 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:03.679585 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:03.679734 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:04.072914 systemd[1]: Started systemd-journald.service. Dec 13 02:00:03.679778 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:00:03.679852 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-12-13T02:00:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:00:04.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.073955 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:00:04.074749 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:00:04.075510 systemd[1]: Mounted media.mount. Dec 13 02:00:04.076226 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:00:04.077050 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:00:04.077903 systemd[1]: Mounted tmp.mount. Dec 13 02:00:04.078795 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:00:04.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.079879 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:00:04.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.080912 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:00:04.081124 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:00:04.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.082114 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:04.082301 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:04.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.083269 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:00:04.083426 systemd[1]: Finished modprobe@drm.service. Dec 13 02:00:04.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.084363 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:04.084522 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:04.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.085523 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:00:04.085674 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:00:04.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.086617 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:04.086762 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:04.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.087922 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:00:04.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.089039 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:00:04.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.090285 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:00:04.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.091504 systemd[1]: Reached target network-pre.target. Dec 13 02:00:04.093336 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:00:04.094930 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:00:04.095658 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:00:04.096798 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:00:04.098358 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:00:04.099342 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:04.100218 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:00:04.101152 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:04.101972 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:00:04.103635 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:00:04.105587 systemd-journald[1002]: Time spent on flushing to /var/log/journal/159e473616ef45bfac2826ec6b3f8def is 13.379ms for 1153 entries. Dec 13 02:00:04.105587 systemd-journald[1002]: System Journal (/var/log/journal/159e473616ef45bfac2826ec6b3f8def) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:00:04.124354 systemd-journald[1002]: Received client request to flush runtime journal. Dec 13 02:00:04.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.106312 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:00:04.108875 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:00:04.110692 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:00:04.111959 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:00:04.116848 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:00:04.121882 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:00:04.123805 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:00:04.124940 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:00:04.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.128824 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:00:04.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.132003 udevadm[1025]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:00:04.514712 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:00:04.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.515000 audit: BPF prog-id=24 op=LOAD Dec 13 02:00:04.515000 audit: BPF prog-id=25 op=LOAD Dec 13 02:00:04.515000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:00:04.515000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:00:04.516955 systemd[1]: Starting systemd-udevd.service... Dec 13 02:00:04.531454 systemd-udevd[1027]: Using default interface naming scheme 'v252'. Dec 13 02:00:04.542833 systemd[1]: Started systemd-udevd.service. Dec 13 02:00:04.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.544000 audit: BPF prog-id=26 op=LOAD Dec 13 02:00:04.546032 systemd[1]: Starting systemd-networkd.service... Dec 13 02:00:04.548000 audit: BPF prog-id=27 op=LOAD Dec 13 02:00:04.549000 audit: BPF prog-id=28 op=LOAD Dec 13 02:00:04.549000 audit: BPF prog-id=29 op=LOAD Dec 13 02:00:04.550509 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:00:04.564469 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:00:04.578011 systemd[1]: Started systemd-userdbd.service. Dec 13 02:00:04.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.616969 systemd-networkd[1040]: lo: Link UP Dec 13 02:00:04.617224 systemd-networkd[1040]: lo: Gained carrier Dec 13 02:00:04.620911 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:00:04.627000 audit[1033]: AVC avc: denied { confidentiality } for pid=1033 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:00:04.637978 systemd-networkd[1040]: Enumeration completed Dec 13 02:00:04.638106 systemd[1]: Started systemd-networkd.service. Dec 13 02:00:04.638988 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:00:04.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.640174 systemd-networkd[1040]: eth0: Link UP Dec 13 02:00:04.640180 systemd-networkd[1040]: eth0: Gained carrier Dec 13 02:00:04.644935 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:00:04.647453 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:00:04.653034 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:00:04.627000 audit[1033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d965056c00 a1=337fc a2=7f8da4513bc5 a3=5 items=110 ppid=1027 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:04.627000 audit: CWD cwd="/" Dec 13 02:00:04.627000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=1 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=2 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=3 name=(null) inode=13113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=4 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=5 name=(null) inode=13114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=6 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=7 name=(null) inode=13115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=8 name=(null) inode=13115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=9 name=(null) inode=13116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=10 name=(null) inode=13115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=11 name=(null) inode=13117 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=12 name=(null) inode=13115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=13 name=(null) inode=13118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=14 name=(null) inode=13115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=15 name=(null) inode=13119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=16 name=(null) inode=13115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=17 name=(null) inode=13120 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=18 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=19 name=(null) inode=13121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=20 name=(null) inode=13121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=21 name=(null) inode=13122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=22 name=(null) inode=13121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=23 name=(null) inode=13123 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=24 name=(null) inode=13121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=25 name=(null) inode=13124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=26 name=(null) inode=13121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=27 name=(null) inode=13125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=28 name=(null) inode=13121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=29 name=(null) inode=13126 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=30 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=31 name=(null) inode=13127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=32 name=(null) inode=13127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=33 name=(null) inode=13128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=34 name=(null) inode=13127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=35 name=(null) inode=13129 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=36 name=(null) inode=13127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=37 name=(null) inode=13130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=38 name=(null) inode=13127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=39 name=(null) inode=13131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=40 name=(null) inode=13127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=41 name=(null) inode=13132 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=42 name=(null) inode=13112 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=43 name=(null) inode=13133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=44 name=(null) inode=13133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=45 name=(null) inode=13134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=46 name=(null) inode=13133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=47 name=(null) inode=13135 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=48 name=(null) inode=13133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=49 name=(null) inode=13136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=50 name=(null) inode=13133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=51 name=(null) inode=13137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=52 name=(null) inode=13133 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=53 name=(null) inode=13138 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=55 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=56 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=57 name=(null) inode=13140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=58 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=59 name=(null) inode=13141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=60 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=61 name=(null) inode=13142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=62 name=(null) inode=13142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=63 name=(null) inode=13143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=64 name=(null) inode=13142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=65 name=(null) inode=13144 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=66 name=(null) inode=13142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=67 name=(null) inode=13145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=68 name=(null) inode=13142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=69 name=(null) inode=13146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=70 name=(null) inode=13142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=71 name=(null) inode=13147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=72 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=73 name=(null) inode=13148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=74 name=(null) inode=13148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=75 name=(null) inode=13149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=76 name=(null) inode=13148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=77 name=(null) inode=13150 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=78 name=(null) inode=13148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=79 name=(null) inode=13151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=80 name=(null) inode=13148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=81 name=(null) inode=13152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=82 name=(null) inode=13148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=83 name=(null) inode=13153 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=84 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=85 name=(null) inode=13154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=86 name=(null) inode=13154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=87 name=(null) inode=13155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=88 name=(null) inode=13154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=89 name=(null) inode=13156 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=90 name=(null) inode=13154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=91 name=(null) inode=13157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=92 name=(null) inode=13154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=93 name=(null) inode=13158 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=94 name=(null) inode=13154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=95 name=(null) inode=13159 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=96 name=(null) inode=13139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=97 name=(null) inode=13160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=98 name=(null) inode=13160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=99 name=(null) inode=13161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=100 name=(null) inode=13160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=101 name=(null) inode=13162 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=102 name=(null) inode=13160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=103 name=(null) inode=13163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=104 name=(null) inode=13160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=105 name=(null) inode=13164 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=106 name=(null) inode=13160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=107 name=(null) inode=13165 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PATH item=109 name=(null) inode=1644 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:04.627000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:00:04.686919 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:00:04.698339 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 02:00:04.701779 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 02:00:04.702211 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 02:00:04.702557 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 02:00:04.702806 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:00:04.723268 kernel: kvm: Nested Virtualization enabled Dec 13 02:00:04.723361 kernel: SVM: kvm: Nested Paging enabled Dec 13 02:00:04.723374 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 02:00:04.724127 kernel: SVM: Virtual GIF supported Dec 13 02:00:04.740912 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:00:04.768370 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:00:04.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.770840 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:00:04.777582 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:00:04.804923 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:00:04.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.806342 systemd[1]: Reached target cryptsetup.target. Dec 13 02:00:04.808537 systemd[1]: Starting lvm2-activation.service... Dec 13 02:00:04.811487 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:00:04.835964 systemd[1]: Finished lvm2-activation.service. Dec 13 02:00:04.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.837309 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:00:04.838386 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:00:04.838415 systemd[1]: Reached target local-fs.target. Dec 13 02:00:04.839388 systemd[1]: Reached target machines.target. Dec 13 02:00:04.841394 systemd[1]: Starting ldconfig.service... Dec 13 02:00:04.842382 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:04.842422 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:04.843100 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:00:04.844975 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:00:04.847798 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:00:04.850134 systemd[1]: Starting systemd-sysext.service... Dec 13 02:00:04.851310 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1066 (bootctl) Dec 13 02:00:04.852247 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:00:04.854357 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:00:04.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.859431 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:00:04.864127 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:00:04.864273 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:00:04.872914 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:00:04.889255 systemd-fsck[1074]: fsck.fat 4.2 (2021-01-31) Dec 13 02:00:04.889255 systemd-fsck[1074]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 02:00:04.891276 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:00:04.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:04.894497 systemd[1]: Mounting boot.mount... Dec 13 02:00:04.904866 systemd[1]: Mounted boot.mount. Dec 13 02:00:05.093600 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:00:05.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.096766 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:00:05.096905 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:00:05.097307 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:00:05.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.113910 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:00:05.117025 (sd-sysext)[1079]: Using extensions 'kubernetes'. Dec 13 02:00:05.117349 (sd-sysext)[1079]: Merged extensions into '/usr'. Dec 13 02:00:05.131972 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.132710 ldconfig[1065]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:00:05.133261 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:00:05.134146 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.135180 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:05.137201 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:05.138844 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:05.139602 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.139719 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:05.139822 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.142276 systemd[1]: Finished ldconfig.service. Dec 13 02:00:05.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.143294 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:00:05.144385 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:05.144493 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:05.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.145652 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:05.145746 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:05.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.146953 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:05.147045 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:05.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.148246 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:05.148335 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.149138 systemd[1]: Finished systemd-sysext.service. Dec 13 02:00:05.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.150847 systemd[1]: Starting ensure-sysext.service... Dec 13 02:00:05.152623 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:00:05.156483 systemd[1]: Reloading. Dec 13 02:00:05.163727 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:00:05.165640 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:00:05.168182 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:00:05.206117 /usr/lib/systemd/system-generators/torcx-generator[1108]: time="2024-12-13T02:00:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:00:05.206143 /usr/lib/systemd/system-generators/torcx-generator[1108]: time="2024-12-13T02:00:05Z" level=info msg="torcx already run" Dec 13 02:00:05.269521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:00:05.269537 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:00:05.286296 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:00:05.336000 audit: BPF prog-id=30 op=LOAD Dec 13 02:00:05.336000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:00:05.336000 audit: BPF prog-id=31 op=LOAD Dec 13 02:00:05.336000 audit: BPF prog-id=32 op=LOAD Dec 13 02:00:05.336000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:00:05.336000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:00:05.336000 audit: BPF prog-id=33 op=LOAD Dec 13 02:00:05.336000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:00:05.337000 audit: BPF prog-id=34 op=LOAD Dec 13 02:00:05.337000 audit: BPF prog-id=35 op=LOAD Dec 13 02:00:05.337000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:00:05.337000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:00:05.338000 audit: BPF prog-id=36 op=LOAD Dec 13 02:00:05.338000 audit: BPF prog-id=37 op=LOAD Dec 13 02:00:05.338000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:00:05.338000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:00:05.338000 audit: BPF prog-id=38 op=LOAD Dec 13 02:00:05.338000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:00:05.342263 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:00:05.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.346549 systemd[1]: Starting audit-rules.service... Dec 13 02:00:05.348244 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:00:05.350033 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:00:05.350000 audit: BPF prog-id=39 op=LOAD Dec 13 02:00:05.352284 systemd[1]: Starting systemd-resolved.service... Dec 13 02:00:05.353000 audit: BPF prog-id=40 op=LOAD Dec 13 02:00:05.354761 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:00:05.356440 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:00:05.357700 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:00:05.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.360513 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:05.361880 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.362062 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.363063 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:05.364734 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:05.364000 audit[1158]: SYSTEM_BOOT pid=1158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.366514 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:05.367679 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.367796 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:05.367897 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:05.367973 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.368836 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:05.368988 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:05.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.370210 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:05.370308 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:05.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.371518 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:05.371614 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:05.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:05.374185 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:05.374339 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.373000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:00:05.373000 audit[1170]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd68d33a20 a2=420 a3=0 items=0 ppid=1147 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:05.373000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:00:05.374985 augenrules[1170]: No rules Dec 13 02:00:05.375447 systemd[1]: Finished audit-rules.service. Dec 13 02:00:05.376488 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:00:05.378539 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.378700 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.379609 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:05.381546 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:05.383154 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:05.383882 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.384016 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:05.384110 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:05.384171 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.384968 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:00:05.386263 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:05.386359 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:05.387436 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:05.387533 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:05.388645 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:05.388737 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:05.389771 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:05.389852 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.390847 systemd[1]: Starting systemd-update-done.service... Dec 13 02:00:05.394228 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.394419 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.395340 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:05.397064 systemd[1]: Starting modprobe@drm.service... Dec 13 02:00:05.399196 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:05.400966 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:05.401789 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.401917 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:05.405114 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:00:05.406273 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:05.406363 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:05.407383 systemd[1]: Finished systemd-update-done.service. Dec 13 02:00:05.408594 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:05.408704 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:05.409867 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:00:05.410013 systemd[1]: Finished modprobe@drm.service. Dec 13 02:00:05.411169 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:05.411287 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:05.412576 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:05.412694 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:05.414244 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:05.414359 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:05.415500 systemd[1]: Finished ensure-sysext.service. Dec 13 02:00:05.416011 systemd-resolved[1151]: Positive Trust Anchors: Dec 13 02:00:05.416024 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:00:05.416050 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:00:05.422737 systemd-resolved[1151]: Defaulting to hostname 'linux'. Dec 13 02:00:05.424174 systemd[1]: Started systemd-resolved.service. Dec 13 02:00:05.425216 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:00:06.024955 systemd-resolved[1151]: Clock change detected. Flushing caches. Dec 13 02:00:06.024985 systemd-timesyncd[1157]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 02:00:06.025022 systemd-timesyncd[1157]: Initial clock synchronization to Fri 2024-12-13 02:00:06.024918 UTC. Dec 13 02:00:06.025878 systemd[1]: Reached target network.target. Dec 13 02:00:06.026743 systemd[1]: Reached target nss-lookup.target. Dec 13 02:00:06.027609 systemd[1]: Reached target sysinit.target. Dec 13 02:00:06.028491 systemd[1]: Started motdgen.path. Dec 13 02:00:06.029316 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:00:06.030483 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:00:06.031410 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:00:06.031435 systemd[1]: Reached target paths.target. Dec 13 02:00:06.032244 systemd[1]: Reached target time-set.target. Dec 13 02:00:06.033204 systemd[1]: Started logrotate.timer. Dec 13 02:00:06.034044 systemd[1]: Started mdadm.timer. Dec 13 02:00:06.034791 systemd[1]: Reached target timers.target. Dec 13 02:00:06.035839 systemd[1]: Listening on dbus.socket. Dec 13 02:00:06.037475 systemd[1]: Starting docker.socket... Dec 13 02:00:06.040269 systemd[1]: Listening on sshd.socket. Dec 13 02:00:06.041174 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:06.041496 systemd[1]: Listening on docker.socket. Dec 13 02:00:06.042360 systemd[1]: Reached target sockets.target. Dec 13 02:00:06.043207 systemd[1]: Reached target basic.target. Dec 13 02:00:06.044049 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:00:06.044071 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:00:06.044881 systemd[1]: Starting containerd.service... Dec 13 02:00:06.046448 systemd[1]: Starting dbus.service... Dec 13 02:00:06.047938 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:00:06.049575 systemd[1]: Starting extend-filesystems.service... Dec 13 02:00:06.050595 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:00:06.052939 jq[1189]: false Dec 13 02:00:06.051436 systemd[1]: Starting motdgen.service... Dec 13 02:00:06.053671 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:00:06.056484 systemd[1]: Starting sshd-keygen.service... Dec 13 02:00:06.059136 systemd[1]: Starting systemd-logind.service... Dec 13 02:00:06.060100 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:06.060148 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:00:06.060470 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:00:06.061429 systemd[1]: Starting update-engine.service... Dec 13 02:00:06.069213 dbus-daemon[1188]: [system] SELinux support is enabled Dec 13 02:00:06.063358 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:00:06.065746 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:00:06.070817 jq[1203]: true Dec 13 02:00:06.065902 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:00:06.067858 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:00:06.069404 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:00:06.070640 systemd[1]: Started dbus.service. Dec 13 02:00:06.073203 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:00:06.073331 systemd[1]: Finished motdgen.service. Dec 13 02:00:06.075519 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:00:06.075621 systemd[1]: Reached target system-config.target. Dec 13 02:00:06.076829 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:00:06.076847 systemd[1]: Reached target user-config.target. Dec 13 02:00:06.079371 jq[1209]: true Dec 13 02:00:06.079493 extend-filesystems[1190]: Found loop1 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found sr0 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda1 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda2 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda3 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found usr Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda4 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda6 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda7 Dec 13 02:00:06.079493 extend-filesystems[1190]: Found vda9 Dec 13 02:00:06.079493 extend-filesystems[1190]: Checking size of /dev/vda9 Dec 13 02:00:06.094375 extend-filesystems[1190]: Resized partition /dev/vda9 Dec 13 02:00:06.095504 extend-filesystems[1227]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:00:06.103565 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 02:00:06.105156 update_engine[1199]: I1213 02:00:06.105022 1199 main.cc:92] Flatcar Update Engine starting Dec 13 02:00:06.108725 systemd[1]: Started update-engine.service. Dec 13 02:00:06.108930 update_engine[1199]: I1213 02:00:06.108768 1199 update_check_scheduler.cc:74] Next update check in 4m34s Dec 13 02:00:06.114447 systemd[1]: Started locksmithd.service. Dec 13 02:00:06.115012 env[1210]: time="2024-12-13T02:00:06.114855916Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:00:06.128665 systemd-logind[1196]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:00:06.128683 systemd-logind[1196]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:00:06.129284 systemd-logind[1196]: New seat seat0. Dec 13 02:00:06.133642 systemd[1]: Started systemd-logind.service. Dec 13 02:00:06.134896 env[1210]: time="2024-12-13T02:00:06.134860529Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:00:06.135061 env[1210]: time="2024-12-13T02:00:06.135044604Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:06.136371 env[1210]: time="2024-12-13T02:00:06.136340465Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:00:06.159930 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 02:00:06.159833 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:00:06.160012 extend-filesystems[1227]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 02:00:06.160012 extend-filesystems[1227]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 02:00:06.160012 extend-filesystems[1227]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.136427859Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159288699Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159306984Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159320148Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159328384Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159402082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159598751Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159699800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159713436Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159764321Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:00:06.160792 env[1210]: time="2024-12-13T02:00:06.159774931Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:00:06.159995 systemd[1]: Finished extend-filesystems.service. Dec 13 02:00:06.161184 extend-filesystems[1190]: Resized filesystem in /dev/vda9 Dec 13 02:00:06.166502 bash[1239]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:00:06.166724 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:00:06.168441 env[1210]: time="2024-12-13T02:00:06.168398527Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:00:06.168587 env[1210]: time="2024-12-13T02:00:06.168449322Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:00:06.168587 env[1210]: time="2024-12-13T02:00:06.168463909Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:00:06.168587 env[1210]: time="2024-12-13T02:00:06.168500889Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168587 env[1210]: time="2024-12-13T02:00:06.168515286Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168587 env[1210]: time="2024-12-13T02:00:06.168573405Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168704 env[1210]: time="2024-12-13T02:00:06.168594835Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168704 env[1210]: time="2024-12-13T02:00:06.168613520Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168704 env[1210]: time="2024-12-13T02:00:06.168630953Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168704 env[1210]: time="2024-12-13T02:00:06.168648215Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168704 env[1210]: time="2024-12-13T02:00:06.168663444Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.168812 env[1210]: time="2024-12-13T02:00:06.168679133Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:00:06.168858 env[1210]: time="2024-12-13T02:00:06.168835086Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:00:06.168936 env[1210]: time="2024-12-13T02:00:06.168912932Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:00:06.169262 env[1210]: time="2024-12-13T02:00:06.169219607Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:00:06.169304 env[1210]: time="2024-12-13T02:00:06.169277125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169304 env[1210]: time="2024-12-13T02:00:06.169293125Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:00:06.169349 env[1210]: time="2024-12-13T02:00:06.169339732Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169370 env[1210]: time="2024-12-13T02:00:06.169352095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169370 env[1210]: time="2024-12-13T02:00:06.169365771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169411 env[1210]: time="2024-12-13T02:00:06.169376802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169411 env[1210]: time="2024-12-13T02:00:06.169388383Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169411 env[1210]: time="2024-12-13T02:00:06.169400256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169411 env[1210]: time="2024-12-13T02:00:06.169410675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169491 env[1210]: time="2024-12-13T02:00:06.169422387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169491 env[1210]: time="2024-12-13T02:00:06.169436514Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:00:06.169740 env[1210]: time="2024-12-13T02:00:06.169701391Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169740 env[1210]: time="2024-12-13T02:00:06.169724273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169801 env[1210]: time="2024-12-13T02:00:06.169746525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.169801 env[1210]: time="2024-12-13T02:00:06.169758628Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:00:06.169801 env[1210]: time="2024-12-13T02:00:06.169773526Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:00:06.169801 env[1210]: time="2024-12-13T02:00:06.169785158Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:00:06.169884 env[1210]: time="2024-12-13T02:00:06.169802781Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:00:06.169884 env[1210]: time="2024-12-13T02:00:06.169870788Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:00:06.170105 env[1210]: time="2024-12-13T02:00:06.170054533Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:00:06.170818 env[1210]: time="2024-12-13T02:00:06.170108725Z" level=info msg="Connect containerd service" Dec 13 02:00:06.170818 env[1210]: time="2024-12-13T02:00:06.170142638Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:00:06.170818 env[1210]: time="2024-12-13T02:00:06.170652114Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:00:06.170818 env[1210]: time="2024-12-13T02:00:06.170783140Z" level=info msg="Start subscribing containerd event" Dec 13 02:00:06.170918 env[1210]: time="2024-12-13T02:00:06.170826811Z" level=info msg="Start recovering state" Dec 13 02:00:06.170918 env[1210]: time="2024-12-13T02:00:06.170879931Z" level=info msg="Start event monitor" Dec 13 02:00:06.170918 env[1210]: time="2024-12-13T02:00:06.170896502Z" level=info msg="Start snapshots syncer" Dec 13 02:00:06.170918 env[1210]: time="2024-12-13T02:00:06.170884470Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:00:06.170918 env[1210]: time="2024-12-13T02:00:06.170905589Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:00:06.170918 env[1210]: time="2024-12-13T02:00:06.170914566Z" level=info msg="Start streaming server" Dec 13 02:00:06.171032 env[1210]: time="2024-12-13T02:00:06.170930466Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:00:06.171003 systemd[1]: Started containerd.service. Dec 13 02:00:06.171908 locksmithd[1240]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:00:06.175947 env[1210]: time="2024-12-13T02:00:06.175907381Z" level=info msg="containerd successfully booted in 0.061810s" Dec 13 02:00:06.423137 sshd_keygen[1208]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:00:06.440804 systemd[1]: Finished sshd-keygen.service. Dec 13 02:00:06.443108 systemd[1]: Starting issuegen.service... Dec 13 02:00:06.447743 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:00:06.447861 systemd[1]: Finished issuegen.service. Dec 13 02:00:06.449789 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:00:06.455201 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:00:06.457361 systemd[1]: Started getty@tty1.service. Dec 13 02:00:06.459157 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:00:06.460212 systemd[1]: Reached target getty.target. Dec 13 02:00:07.238680 systemd-networkd[1040]: eth0: Gained IPv6LL Dec 13 02:00:07.240424 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:00:07.241774 systemd[1]: Reached target network-online.target. Dec 13 02:00:07.244076 systemd[1]: Starting kubelet.service... Dec 13 02:00:07.785876 systemd[1]: Started kubelet.service. Dec 13 02:00:07.787142 systemd[1]: Reached target multi-user.target. Dec 13 02:00:07.789180 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:00:07.794945 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:00:07.795064 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:00:07.798604 systemd[1]: Startup finished in 590ms (kernel) + 3.928s (initrd) + 5.577s (userspace) = 10.097s. Dec 13 02:00:08.201491 kubelet[1265]: E1213 02:00:08.201382 1265 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:00:08.203132 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:00:08.203248 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:00:15.491254 systemd[1]: Created slice system-sshd.slice. Dec 13 02:00:15.492048 systemd[1]: Started sshd@0-10.0.0.142:22-10.0.0.1:32910.service. Dec 13 02:00:15.526887 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 32910 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:15.528223 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:15.535765 systemd[1]: Created slice user-500.slice. Dec 13 02:00:15.536967 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:00:15.538608 systemd-logind[1196]: New session 1 of user core. Dec 13 02:00:15.545829 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:00:15.547463 systemd[1]: Starting user@500.service... Dec 13 02:00:15.550303 (systemd)[1278]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:15.619251 systemd[1278]: Queued start job for default target default.target. Dec 13 02:00:15.619710 systemd[1278]: Reached target paths.target. Dec 13 02:00:15.619730 systemd[1278]: Reached target sockets.target. Dec 13 02:00:15.619741 systemd[1278]: Reached target timers.target. Dec 13 02:00:15.619752 systemd[1278]: Reached target basic.target. Dec 13 02:00:15.619782 systemd[1278]: Reached target default.target. Dec 13 02:00:15.619803 systemd[1278]: Startup finished in 63ms. Dec 13 02:00:15.619863 systemd[1]: Started user@500.service. Dec 13 02:00:15.620710 systemd[1]: Started session-1.scope. Dec 13 02:00:15.669633 systemd[1]: Started sshd@1-10.0.0.142:22-10.0.0.1:32920.service. Dec 13 02:00:15.702993 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 32920 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:15.703839 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:15.706804 systemd-logind[1196]: New session 2 of user core. Dec 13 02:00:15.707701 systemd[1]: Started session-2.scope. Dec 13 02:00:15.758836 sshd[1287]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:15.761169 systemd[1]: sshd@1-10.0.0.142:22-10.0.0.1:32920.service: Deactivated successfully. Dec 13 02:00:15.761631 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:00:15.762031 systemd-logind[1196]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:00:15.762770 systemd[1]: Started sshd@2-10.0.0.142:22-10.0.0.1:32934.service. Dec 13 02:00:15.763291 systemd-logind[1196]: Removed session 2. Dec 13 02:00:15.793960 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 32934 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:15.794873 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:15.797623 systemd-logind[1196]: New session 3 of user core. Dec 13 02:00:15.798296 systemd[1]: Started session-3.scope. Dec 13 02:00:15.845407 sshd[1293]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:15.848059 systemd[1]: sshd@2-10.0.0.142:22-10.0.0.1:32934.service: Deactivated successfully. Dec 13 02:00:15.848569 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:00:15.849030 systemd-logind[1196]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:00:15.849886 systemd[1]: Started sshd@3-10.0.0.142:22-10.0.0.1:32938.service. Dec 13 02:00:15.850426 systemd-logind[1196]: Removed session 3. Dec 13 02:00:15.880996 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 32938 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:15.881870 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:15.884622 systemd-logind[1196]: New session 4 of user core. Dec 13 02:00:15.885310 systemd[1]: Started session-4.scope. Dec 13 02:00:15.935698 sshd[1299]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:15.938115 systemd[1]: sshd@3-10.0.0.142:22-10.0.0.1:32938.service: Deactivated successfully. Dec 13 02:00:15.938591 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:00:15.939035 systemd-logind[1196]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:00:15.939906 systemd[1]: Started sshd@4-10.0.0.142:22-10.0.0.1:32952.service. Dec 13 02:00:15.940446 systemd-logind[1196]: Removed session 4. Dec 13 02:00:15.971378 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 32952 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:15.972322 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:15.975022 systemd-logind[1196]: New session 5 of user core. Dec 13 02:00:15.975723 systemd[1]: Started session-5.scope. Dec 13 02:00:16.028995 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:00:16.029212 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:00:16.038714 dbus-daemon[1188]: \xd0\xcdP\xaceU: received setenforce notice (enforcing=1706746432) Dec 13 02:00:16.040566 sudo[1308]: pam_unix(sudo:session): session closed for user root Dec 13 02:00:16.041870 sshd[1305]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:16.044310 systemd[1]: sshd@4-10.0.0.142:22-10.0.0.1:32952.service: Deactivated successfully. Dec 13 02:00:16.044784 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:00:16.045229 systemd-logind[1196]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:00:16.046187 systemd[1]: Started sshd@5-10.0.0.142:22-10.0.0.1:52016.service. Dec 13 02:00:16.046729 systemd-logind[1196]: Removed session 5. Dec 13 02:00:16.077757 sshd[1312]: Accepted publickey for core from 10.0.0.1 port 52016 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:16.078631 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:16.081745 systemd-logind[1196]: New session 6 of user core. Dec 13 02:00:16.082623 systemd[1]: Started session-6.scope. Dec 13 02:00:16.133430 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:00:16.133638 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:00:16.135694 sudo[1316]: pam_unix(sudo:session): session closed for user root Dec 13 02:00:16.139854 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:00:16.140022 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:00:16.147661 systemd[1]: Stopping audit-rules.service... Dec 13 02:00:16.147000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:00:16.149594 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 02:00:16.149650 kernel: audit: type=1305 audit(1734055216.147:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:00:16.149718 auditctl[1319]: No rules Dec 13 02:00:16.149933 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:00:16.150051 systemd[1]: Stopped audit-rules.service. Dec 13 02:00:16.151241 systemd[1]: Starting audit-rules.service... Dec 13 02:00:16.147000 audit[1319]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd14405d20 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.157641 kernel: audit: type=1300 audit(1734055216.147:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd14405d20 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.157683 kernel: audit: type=1327 audit(1734055216.147:199): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:00:16.157703 kernel: audit: type=1131 audit(1734055216.148:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.147000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:00:16.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.164542 augenrules[1336]: No rules Dec 13 02:00:16.164954 systemd[1]: Finished audit-rules.service. Dec 13 02:00:16.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.165704 sudo[1315]: pam_unix(sudo:session): session closed for user root Dec 13 02:00:16.166900 sshd[1312]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:16.164000 audit[1315]: USER_END pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.169506 systemd[1]: Started sshd@6-10.0.0.142:22-10.0.0.1:52024.service. Dec 13 02:00:16.169919 systemd[1]: sshd@5-10.0.0.142:22-10.0.0.1:52016.service: Deactivated successfully. Dec 13 02:00:16.170397 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:00:16.171371 systemd-logind[1196]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:00:16.171969 kernel: audit: type=1130 audit(1734055216.163:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.172019 kernel: audit: type=1106 audit(1734055216.164:202): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.172038 kernel: audit: type=1104 audit(1734055216.164:203): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.164000 audit[1315]: CRED_DISP pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.172234 systemd-logind[1196]: Removed session 6. Dec 13 02:00:16.175124 kernel: audit: type=1106 audit(1734055216.166:204): pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.166000 audit[1312]: USER_END pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.179377 kernel: audit: type=1104 audit(1734055216.166:205): pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.166000 audit[1312]: CRED_DISP pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.182687 kernel: audit: type=1130 audit(1734055216.168:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:52024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:52024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:52016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.205000 audit[1341]: USER_ACCT pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.207151 sshd[1341]: Accepted publickey for core from 10.0.0.1 port 52024 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:16.206000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.206000 audit[1341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d2422f0 a2=3 a3=0 items=0 ppid=1 pid=1341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.206000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:16.208090 sshd[1341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:16.210930 systemd-logind[1196]: New session 7 of user core. Dec 13 02:00:16.211638 systemd[1]: Started session-7.scope. Dec 13 02:00:16.212000 audit[1341]: USER_START pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.213000 audit[1344]: CRED_ACQ pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:16.260000 audit[1345]: USER_ACCT pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.261840 sudo[1345]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:00:16.260000 audit[1345]: CRED_REFR pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.262013 sudo[1345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:00:16.261000 audit[1345]: USER_START pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.272219 systemd[1]: Starting coreos-metadata.service... Dec 13 02:00:16.277440 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 02:00:16.277582 systemd[1]: Finished coreos-metadata.service. Dec 13 02:00:16.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:16.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:17.010365 systemd[1]: Stopped kubelet.service. Dec 13 02:00:17.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:17.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:17.012714 systemd[1]: Starting kubelet.service... Dec 13 02:00:17.030207 systemd[1]: Reloading. Dec 13 02:00:17.093873 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2024-12-13T02:00:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:00:17.093901 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2024-12-13T02:00:17Z" level=info msg="torcx already run" Dec 13 02:00:17.307329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:00:17.307345 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:00:17.324035 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.378000 audit: BPF prog-id=46 op=LOAD Dec 13 02:00:17.378000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.379000 audit: BPF prog-id=47 op=LOAD Dec 13 02:00:17.379000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit: BPF prog-id=48 op=LOAD Dec 13 02:00:17.380000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit: BPF prog-id=49 op=LOAD Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit: BPF prog-id=50 op=LOAD Dec 13 02:00:17.380000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:00:17.380000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit: BPF prog-id=51 op=LOAD Dec 13 02:00:17.381000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit: BPF prog-id=52 op=LOAD Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.381000 audit: BPF prog-id=53 op=LOAD Dec 13 02:00:17.381000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:00:17.381000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit: BPF prog-id=54 op=LOAD Dec 13 02:00:17.383000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit: BPF prog-id=55 op=LOAD Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.383000 audit: BPF prog-id=56 op=LOAD Dec 13 02:00:17.383000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:00:17.383000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit: BPF prog-id=57 op=LOAD Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit: BPF prog-id=58 op=LOAD Dec 13 02:00:17.384000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:00:17.384000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit: BPF prog-id=59 op=LOAD Dec 13 02:00:17.385000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.385000 audit: BPF prog-id=60 op=LOAD Dec 13 02:00:17.385000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:00:17.396168 systemd[1]: Started kubelet.service. Dec 13 02:00:17.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:17.397302 systemd[1]: Stopping kubelet.service... Dec 13 02:00:17.397546 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:00:17.397682 systemd[1]: Stopped kubelet.service. Dec 13 02:00:17.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:17.398895 systemd[1]: Starting kubelet.service... Dec 13 02:00:17.469261 systemd[1]: Started kubelet.service. Dec 13 02:00:17.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:17.504253 kubelet[1460]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:00:17.504253 kubelet[1460]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:00:17.504253 kubelet[1460]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:00:17.505132 kubelet[1460]: I1213 02:00:17.505095 1460 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:00:17.840652 kubelet[1460]: I1213 02:00:17.840618 1460 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:00:17.840652 kubelet[1460]: I1213 02:00:17.840654 1460 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:00:17.840906 kubelet[1460]: I1213 02:00:17.840883 1460 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:00:17.850239 kubelet[1460]: I1213 02:00:17.850199 1460 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:00:17.862053 kubelet[1460]: I1213 02:00:17.862015 1460 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:00:17.863059 kubelet[1460]: I1213 02:00:17.863022 1460 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:00:17.863223 kubelet[1460]: I1213 02:00:17.863056 1460 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.142","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:00:17.863630 kubelet[1460]: I1213 02:00:17.863612 1460 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:00:17.863630 kubelet[1460]: I1213 02:00:17.863627 1460 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:00:17.863746 kubelet[1460]: I1213 02:00:17.863729 1460 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:00:17.864298 kubelet[1460]: I1213 02:00:17.864281 1460 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:00:17.864298 kubelet[1460]: I1213 02:00:17.864298 1460 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:00:17.864343 kubelet[1460]: I1213 02:00:17.864317 1460 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:00:17.864343 kubelet[1460]: I1213 02:00:17.864332 1460 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:00:17.864486 kubelet[1460]: E1213 02:00:17.864451 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:17.864547 kubelet[1460]: E1213 02:00:17.864496 1460 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:17.867397 kubelet[1460]: I1213 02:00:17.867366 1460 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:00:17.868070 kubelet[1460]: W1213 02:00:17.868047 1460 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.142" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:00:17.868149 kubelet[1460]: E1213 02:00:17.868112 1460 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.142" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:00:17.868204 kubelet[1460]: W1213 02:00:17.868183 1460 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:00:17.868229 kubelet[1460]: E1213 02:00:17.868210 1460 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:00:17.868633 kubelet[1460]: I1213 02:00:17.868618 1460 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:00:17.868695 kubelet[1460]: W1213 02:00:17.868656 1460 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:00:17.869084 kubelet[1460]: I1213 02:00:17.869072 1460 server.go:1264] "Started kubelet" Dec 13 02:00:17.869174 kubelet[1460]: I1213 02:00:17.869124 1460 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:00:17.869348 kubelet[1460]: I1213 02:00:17.869302 1460 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:00:17.869562 kubelet[1460]: I1213 02:00:17.869549 1460 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:00:17.870312 kubelet[1460]: I1213 02:00:17.870286 1460 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:00:17.869000 audit[1460]: AVC avc: denied { mac_admin } for pid=1460 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.869000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:00:17.869000 audit[1460]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001307b0 a1=c000aeae88 a2=c000130780 a3=25 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:17.869000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:00:17.869000 audit[1460]: AVC avc: denied { mac_admin } for pid=1460 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:17.869000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:00:17.869000 audit[1460]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000958aa0 a1=c000aeaea0 a2=c000130a20 a3=25 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:17.869000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:00:17.871040 kubelet[1460]: I1213 02:00:17.870680 1460 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:00:17.871040 kubelet[1460]: I1213 02:00:17.870732 1460 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:00:17.871040 kubelet[1460]: I1213 02:00:17.870775 1460 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:00:17.873155 kubelet[1460]: I1213 02:00:17.872966 1460 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:00:17.873155 kubelet[1460]: I1213 02:00:17.873056 1460 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:00:17.873155 kubelet[1460]: I1213 02:00:17.873121 1460 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:00:17.873302 kubelet[1460]: E1213 02:00:17.873279 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:17.874556 kubelet[1460]: I1213 02:00:17.874537 1460 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:00:17.874631 kubelet[1460]: I1213 02:00:17.874611 1460 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:00:17.875187 kubelet[1460]: E1213 02:00:17.875161 1460 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:00:17.875421 kubelet[1460]: I1213 02:00:17.875396 1460 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:00:17.883475 kubelet[1460]: I1213 02:00:17.883452 1460 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:00:17.883475 kubelet[1460]: I1213 02:00:17.883465 1460 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:00:17.883475 kubelet[1460]: I1213 02:00:17.883484 1460 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:00:17.895128 kubelet[1460]: E1213 02:00:17.895087 1460 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.142\" not found" node="10.0.0.142" Dec 13 02:00:17.974134 kubelet[1460]: I1213 02:00:17.974091 1460 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.142" Dec 13 02:00:18.258575 kubelet[1460]: I1213 02:00:18.257884 1460 policy_none.go:49] "None policy: Start" Dec 13 02:00:18.258905 kubelet[1460]: I1213 02:00:18.258890 1460 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:00:18.259032 kubelet[1460]: I1213 02:00:18.259020 1460 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:00:18.265301 kubelet[1460]: I1213 02:00:18.265262 1460 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.142" Dec 13 02:00:18.264000 audit[1473]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.264000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5246a790 a2=0 a3=7ffc5246a77c items=0 ppid=1460 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:00:18.266895 kubelet[1460]: I1213 02:00:18.266867 1460 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 02:00:18.267213 env[1210]: time="2024-12-13T02:00:18.267161127Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:00:18.265000 audit[1479]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.265000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc87e287d0 a2=0 a3=7ffc87e287bc items=0 ppid=1460 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:00:18.267733 kubelet[1460]: I1213 02:00:18.267651 1460 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 02:00:18.271460 systemd[1]: Created slice kubepods.slice. Dec 13 02:00:18.274911 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:00:18.275158 kubelet[1460]: E1213 02:00:18.275132 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.279969 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:00:18.285381 kubelet[1460]: I1213 02:00:18.285354 1460 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:00:18.283000 audit[1460]: AVC avc: denied { mac_admin } for pid=1460 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:18.283000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:00:18.268000 audit[1481]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.268000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2fc1d910 a2=0 a3=7ffc2fc1d8fc items=0 ppid=1460 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:00:18.283000 audit[1460]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a8cb10 a1=c000e5ee70 a2=c000a8cae0 a3=25 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.283000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:00:18.285716 kubelet[1460]: I1213 02:00:18.285470 1460 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:00:18.285716 kubelet[1460]: I1213 02:00:18.285616 1460 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:00:18.285777 kubelet[1460]: I1213 02:00:18.285728 1460 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:00:18.287513 kubelet[1460]: E1213 02:00:18.287501 1460 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.142\" not found" Dec 13 02:00:18.286000 audit[1486]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.286000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe98f9dfd0 a2=0 a3=7ffe98f9dfbc items=0 ppid=1460 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:00:18.319000 audit[1491]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.319000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd2ac5e460 a2=0 a3=7ffd2ac5e44c items=0 ppid=1460 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:00:18.321490 kubelet[1460]: I1213 02:00:18.321379 1460 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:00:18.320000 audit[1492]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:18.320000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcaf42aac0 a2=0 a3=7ffcaf42aaac items=0 ppid=1460 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:00:18.322212 kubelet[1460]: I1213 02:00:18.322197 1460 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:00:18.322239 kubelet[1460]: I1213 02:00:18.322218 1460 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:00:18.322239 kubelet[1460]: I1213 02:00:18.322235 1460 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:00:18.322285 kubelet[1460]: E1213 02:00:18.322273 1460 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 02:00:18.321000 audit[1493]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.321000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1cb79b10 a2=0 a3=7ffc1cb79afc items=0 ppid=1460 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:00:18.321000 audit[1494]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:18.321000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdab153e60 a2=0 a3=7ffdab153e4c items=0 ppid=1460 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:00:18.322000 audit[1495]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.322000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcdd1197a0 a2=0 a3=7ffcdd11978c items=0 ppid=1460 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:00:18.322000 audit[1496]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:18.322000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff5a45c7d0 a2=0 a3=7fff5a45c7bc items=0 ppid=1460 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:00:18.322000 audit[1497]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:18.322000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3d34c900 a2=0 a3=7fff3d34c8ec items=0 ppid=1460 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:00:18.323000 audit[1498]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:18.323000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed24b2c00 a2=0 a3=7ffed24b2bec items=0 ppid=1460 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:00:18.376085 kubelet[1460]: E1213 02:00:18.376026 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.476868 kubelet[1460]: E1213 02:00:18.476829 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.482088 sudo[1345]: pam_unix(sudo:session): session closed for user root Dec 13 02:00:18.480000 audit[1345]: USER_END pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:18.480000 audit[1345]: CRED_DISP pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:00:18.483125 sshd[1341]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:18.482000 audit[1341]: USER_END pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.482000 audit[1341]: CRED_DISP pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.485347 systemd[1]: sshd@6-10.0.0.142:22-10.0.0.1:52024.service: Deactivated successfully. Dec 13 02:00:18.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:52024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:18.485972 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:00:18.486554 systemd-logind[1196]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:00:18.487308 systemd-logind[1196]: Removed session 7. Dec 13 02:00:18.577481 kubelet[1460]: E1213 02:00:18.577356 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.677869 kubelet[1460]: E1213 02:00:18.677815 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.778411 kubelet[1460]: E1213 02:00:18.778358 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.842720 kubelet[1460]: I1213 02:00:18.842617 1460 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 02:00:18.842845 kubelet[1460]: W1213 02:00:18.842815 1460 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:00:18.843053 kubelet[1460]: W1213 02:00:18.843016 1460 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:00:18.864964 kubelet[1460]: E1213 02:00:18.864924 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:18.879216 kubelet[1460]: E1213 02:00:18.879186 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:18.980078 kubelet[1460]: E1213 02:00:18.980038 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:19.080634 kubelet[1460]: E1213 02:00:19.080568 1460 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" Dec 13 02:00:19.865358 kubelet[1460]: I1213 02:00:19.865298 1460 apiserver.go:52] "Watching apiserver" Dec 13 02:00:19.865795 kubelet[1460]: E1213 02:00:19.865312 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:19.868210 kubelet[1460]: I1213 02:00:19.868160 1460 topology_manager.go:215] "Topology Admit Handler" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" podNamespace="calico-system" podName="calico-node-ktvt6" Dec 13 02:00:19.868292 kubelet[1460]: I1213 02:00:19.868284 1460 topology_manager.go:215] "Topology Admit Handler" podUID="fd828415-db04-43cc-8ba4-01f937db2391" podNamespace="calico-system" podName="csi-node-driver-r5cpj" Dec 13 02:00:19.868358 kubelet[1460]: I1213 02:00:19.868339 1460 topology_manager.go:215] "Topology Admit Handler" podUID="fe170534-64a3-4fd8-a845-937e894aac1e" podNamespace="kube-system" podName="kube-proxy-sn5qf" Dec 13 02:00:19.868741 kubelet[1460]: E1213 02:00:19.868710 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:19.873339 systemd[1]: Created slice kubepods-besteffort-pod1b9c60dd_d412_40c5_8535_0c9da51953f7.slice. Dec 13 02:00:19.873645 kubelet[1460]: I1213 02:00:19.873427 1460 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:00:19.881382 systemd[1]: Created slice kubepods-besteffort-podfe170534_64a3_4fd8_a845_937e894aac1e.slice. Dec 13 02:00:19.882594 kubelet[1460]: I1213 02:00:19.882569 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-bin-dir\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882665 kubelet[1460]: I1213 02:00:19.882602 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-net-dir\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882665 kubelet[1460]: I1213 02:00:19.882622 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-flexvol-driver-host\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882665 kubelet[1460]: I1213 02:00:19.882651 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fd828415-db04-43cc-8ba4-01f937db2391-kubelet-dir\") pod \"csi-node-driver-r5cpj\" (UID: \"fd828415-db04-43cc-8ba4-01f937db2391\") " pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:19.882739 kubelet[1460]: I1213 02:00:19.882668 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fd828415-db04-43cc-8ba4-01f937db2391-socket-dir\") pod \"csi-node-driver-r5cpj\" (UID: \"fd828415-db04-43cc-8ba4-01f937db2391\") " pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:19.882739 kubelet[1460]: I1213 02:00:19.882682 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-run-calico\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882739 kubelet[1460]: I1213 02:00:19.882696 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-lib-calico\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882739 kubelet[1460]: I1213 02:00:19.882710 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-log-dir\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882739 kubelet[1460]: I1213 02:00:19.882726 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kvfj5\" (UniqueName: \"kubernetes.io/projected/1b9c60dd-d412-40c5-8535-0c9da51953f7-kube-api-access-kvfj5\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882881 kubelet[1460]: I1213 02:00:19.882740 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fd828415-db04-43cc-8ba4-01f937db2391-varrun\") pod \"csi-node-driver-r5cpj\" (UID: \"fd828415-db04-43cc-8ba4-01f937db2391\") " pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:19.882881 kubelet[1460]: I1213 02:00:19.882756 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-policysync\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882881 kubelet[1460]: I1213 02:00:19.882786 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1b9c60dd-d412-40c5-8535-0c9da51953f7-node-certs\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882881 kubelet[1460]: I1213 02:00:19.882800 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/fe170534-64a3-4fd8-a845-937e894aac1e-kube-proxy\") pod \"kube-proxy-sn5qf\" (UID: \"fe170534-64a3-4fd8-a845-937e894aac1e\") " pod="kube-system/kube-proxy-sn5qf" Dec 13 02:00:19.882881 kubelet[1460]: I1213 02:00:19.882837 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fe170534-64a3-4fd8-a845-937e894aac1e-xtables-lock\") pod \"kube-proxy-sn5qf\" (UID: \"fe170534-64a3-4fd8-a845-937e894aac1e\") " pod="kube-system/kube-proxy-sn5qf" Dec 13 02:00:19.882985 kubelet[1460]: I1213 02:00:19.882876 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-lib-modules\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882985 kubelet[1460]: I1213 02:00:19.882904 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1b9c60dd-d412-40c5-8535-0c9da51953f7-tigera-ca-bundle\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.882985 kubelet[1460]: I1213 02:00:19.882922 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fclp5\" (UniqueName: \"kubernetes.io/projected/fd828415-db04-43cc-8ba4-01f937db2391-kube-api-access-fclp5\") pod \"csi-node-driver-r5cpj\" (UID: \"fd828415-db04-43cc-8ba4-01f937db2391\") " pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:19.882985 kubelet[1460]: I1213 02:00:19.882941 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fe170534-64a3-4fd8-a845-937e894aac1e-lib-modules\") pod \"kube-proxy-sn5qf\" (UID: \"fe170534-64a3-4fd8-a845-937e894aac1e\") " pod="kube-system/kube-proxy-sn5qf" Dec 13 02:00:19.882985 kubelet[1460]: I1213 02:00:19.882955 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8v8sx\" (UniqueName: \"kubernetes.io/projected/fe170534-64a3-4fd8-a845-937e894aac1e-kube-api-access-8v8sx\") pod \"kube-proxy-sn5qf\" (UID: \"fe170534-64a3-4fd8-a845-937e894aac1e\") " pod="kube-system/kube-proxy-sn5qf" Dec 13 02:00:19.883087 kubelet[1460]: I1213 02:00:19.882969 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-xtables-lock\") pod \"calico-node-ktvt6\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " pod="calico-system/calico-node-ktvt6" Dec 13 02:00:19.883087 kubelet[1460]: I1213 02:00:19.882982 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fd828415-db04-43cc-8ba4-01f937db2391-registration-dir\") pod \"csi-node-driver-r5cpj\" (UID: \"fd828415-db04-43cc-8ba4-01f937db2391\") " pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:19.984281 kubelet[1460]: E1213 02:00:19.984229 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.984281 kubelet[1460]: W1213 02:00:19.984255 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.984281 kubelet[1460]: E1213 02:00:19.984290 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.984481 kubelet[1460]: E1213 02:00:19.984475 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.984505 kubelet[1460]: W1213 02:00:19.984483 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.984505 kubelet[1460]: E1213 02:00:19.984496 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.984745 kubelet[1460]: E1213 02:00:19.984730 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.984745 kubelet[1460]: W1213 02:00:19.984740 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.984818 kubelet[1460]: E1213 02:00:19.984754 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.984944 kubelet[1460]: E1213 02:00:19.984920 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.984944 kubelet[1460]: W1213 02:00:19.984931 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.984944 kubelet[1460]: E1213 02:00:19.984947 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.985242 kubelet[1460]: E1213 02:00:19.985212 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.985242 kubelet[1460]: W1213 02:00:19.985235 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.985297 kubelet[1460]: E1213 02:00:19.985266 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.985474 kubelet[1460]: E1213 02:00:19.985459 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.985474 kubelet[1460]: W1213 02:00:19.985469 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.985562 kubelet[1460]: E1213 02:00:19.985522 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.985672 kubelet[1460]: E1213 02:00:19.985650 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.985672 kubelet[1460]: W1213 02:00:19.985666 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.985753 kubelet[1460]: E1213 02:00:19.985699 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.985865 kubelet[1460]: E1213 02:00:19.985851 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.985865 kubelet[1460]: W1213 02:00:19.985861 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.985916 kubelet[1460]: E1213 02:00:19.985893 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986001 kubelet[1460]: E1213 02:00:19.985989 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986001 kubelet[1460]: W1213 02:00:19.985999 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986045 kubelet[1460]: E1213 02:00:19.986025 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986149 kubelet[1460]: E1213 02:00:19.986137 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986149 kubelet[1460]: W1213 02:00:19.986146 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986196 kubelet[1460]: E1213 02:00:19.986180 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986268 kubelet[1460]: E1213 02:00:19.986256 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986268 kubelet[1460]: W1213 02:00:19.986265 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986315 kubelet[1460]: E1213 02:00:19.986288 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986426 kubelet[1460]: E1213 02:00:19.986410 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986426 kubelet[1460]: W1213 02:00:19.986419 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986489 kubelet[1460]: E1213 02:00:19.986441 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986579 kubelet[1460]: E1213 02:00:19.986568 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986579 kubelet[1460]: W1213 02:00:19.986577 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986627 kubelet[1460]: E1213 02:00:19.986605 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986723 kubelet[1460]: E1213 02:00:19.986711 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986723 kubelet[1460]: W1213 02:00:19.986720 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986771 kubelet[1460]: E1213 02:00:19.986745 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.986897 kubelet[1460]: E1213 02:00:19.986877 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.986897 kubelet[1460]: W1213 02:00:19.986888 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.986943 kubelet[1460]: E1213 02:00:19.986910 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.987047 kubelet[1460]: E1213 02:00:19.987030 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.987047 kubelet[1460]: W1213 02:00:19.987039 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.987142 kubelet[1460]: E1213 02:00:19.987061 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.987236 kubelet[1460]: E1213 02:00:19.987224 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.987236 kubelet[1460]: W1213 02:00:19.987232 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.987304 kubelet[1460]: E1213 02:00:19.987252 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.987411 kubelet[1460]: E1213 02:00:19.987392 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.987411 kubelet[1460]: W1213 02:00:19.987407 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.987482 kubelet[1460]: E1213 02:00:19.987433 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.987601 kubelet[1460]: E1213 02:00:19.987585 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.987601 kubelet[1460]: W1213 02:00:19.987595 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.987668 kubelet[1460]: E1213 02:00:19.987631 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.987748 kubelet[1460]: E1213 02:00:19.987736 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.987748 kubelet[1460]: W1213 02:00:19.987745 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.987802 kubelet[1460]: E1213 02:00:19.987781 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.987927 kubelet[1460]: E1213 02:00:19.987913 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.987927 kubelet[1460]: W1213 02:00:19.987922 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.987986 kubelet[1460]: E1213 02:00:19.987947 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.988070 kubelet[1460]: E1213 02:00:19.988053 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.988070 kubelet[1460]: W1213 02:00:19.988062 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.988163 kubelet[1460]: E1213 02:00:19.988083 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.988214 kubelet[1460]: E1213 02:00:19.988199 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.988214 kubelet[1460]: W1213 02:00:19.988204 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.988271 kubelet[1460]: E1213 02:00:19.988226 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.988364 kubelet[1460]: E1213 02:00:19.988340 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.988364 kubelet[1460]: W1213 02:00:19.988357 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.988444 kubelet[1460]: E1213 02:00:19.988378 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.988545 kubelet[1460]: E1213 02:00:19.988512 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.988545 kubelet[1460]: W1213 02:00:19.988539 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.988605 kubelet[1460]: E1213 02:00:19.988565 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.988707 kubelet[1460]: E1213 02:00:19.988693 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.988707 kubelet[1460]: W1213 02:00:19.988703 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.988772 kubelet[1460]: E1213 02:00:19.988729 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.988882 kubelet[1460]: E1213 02:00:19.988868 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.988882 kubelet[1460]: W1213 02:00:19.988878 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.988936 kubelet[1460]: E1213 02:00:19.988901 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989031 kubelet[1460]: E1213 02:00:19.989019 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989031 kubelet[1460]: W1213 02:00:19.989028 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.989075 kubelet[1460]: E1213 02:00:19.989050 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989179 kubelet[1460]: E1213 02:00:19.989166 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989179 kubelet[1460]: W1213 02:00:19.989174 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.989228 kubelet[1460]: E1213 02:00:19.989196 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989338 kubelet[1460]: E1213 02:00:19.989325 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989338 kubelet[1460]: W1213 02:00:19.989335 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.989401 kubelet[1460]: E1213 02:00:19.989365 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989490 kubelet[1460]: E1213 02:00:19.989477 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989490 kubelet[1460]: W1213 02:00:19.989487 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.989551 kubelet[1460]: E1213 02:00:19.989508 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989683 kubelet[1460]: E1213 02:00:19.989668 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989683 kubelet[1460]: W1213 02:00:19.989676 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.989745 kubelet[1460]: E1213 02:00:19.989698 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989826 kubelet[1460]: E1213 02:00:19.989812 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989826 kubelet[1460]: W1213 02:00:19.989822 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.989874 kubelet[1460]: E1213 02:00:19.989843 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.989967 kubelet[1460]: E1213 02:00:19.989955 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.989967 kubelet[1460]: W1213 02:00:19.989964 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990015 kubelet[1460]: E1213 02:00:19.989985 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.990109 kubelet[1460]: E1213 02:00:19.990098 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.990109 kubelet[1460]: W1213 02:00:19.990106 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990151 kubelet[1460]: E1213 02:00:19.990128 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.990247 kubelet[1460]: E1213 02:00:19.990236 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.990247 kubelet[1460]: W1213 02:00:19.990244 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990326 kubelet[1460]: E1213 02:00:19.990267 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.990396 kubelet[1460]: E1213 02:00:19.990384 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.990396 kubelet[1460]: W1213 02:00:19.990393 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990440 kubelet[1460]: E1213 02:00:19.990415 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.990573 kubelet[1460]: E1213 02:00:19.990561 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.990573 kubelet[1460]: W1213 02:00:19.990571 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990623 kubelet[1460]: E1213 02:00:19.990594 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.990717 kubelet[1460]: E1213 02:00:19.990705 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.990717 kubelet[1460]: W1213 02:00:19.990715 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990761 kubelet[1460]: E1213 02:00:19.990737 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.990861 kubelet[1460]: E1213 02:00:19.990849 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.990861 kubelet[1460]: W1213 02:00:19.990857 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.990926 kubelet[1460]: E1213 02:00:19.990878 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991010 kubelet[1460]: E1213 02:00:19.990996 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991010 kubelet[1460]: W1213 02:00:19.991007 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.991055 kubelet[1460]: E1213 02:00:19.991032 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991158 kubelet[1460]: E1213 02:00:19.991146 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991158 kubelet[1460]: W1213 02:00:19.991157 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.991201 kubelet[1460]: E1213 02:00:19.991181 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991321 kubelet[1460]: E1213 02:00:19.991307 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991321 kubelet[1460]: W1213 02:00:19.991318 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.991400 kubelet[1460]: E1213 02:00:19.991339 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991485 kubelet[1460]: E1213 02:00:19.991467 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991485 kubelet[1460]: W1213 02:00:19.991477 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.991586 kubelet[1460]: E1213 02:00:19.991498 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991663 kubelet[1460]: E1213 02:00:19.991648 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991663 kubelet[1460]: W1213 02:00:19.991659 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.991747 kubelet[1460]: E1213 02:00:19.991681 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991813 kubelet[1460]: E1213 02:00:19.991797 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991813 kubelet[1460]: W1213 02:00:19.991807 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.991877 kubelet[1460]: E1213 02:00:19.991827 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.991960 kubelet[1460]: E1213 02:00:19.991946 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.991960 kubelet[1460]: W1213 02:00:19.991957 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.992032 kubelet[1460]: E1213 02:00:19.991978 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.992102 kubelet[1460]: E1213 02:00:19.992088 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.992102 kubelet[1460]: W1213 02:00:19.992097 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.992164 kubelet[1460]: E1213 02:00:19.992117 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.992258 kubelet[1460]: E1213 02:00:19.992243 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.992258 kubelet[1460]: W1213 02:00:19.992252 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.992335 kubelet[1460]: E1213 02:00:19.992276 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.992420 kubelet[1460]: E1213 02:00:19.992407 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.992420 kubelet[1460]: W1213 02:00:19.992418 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.992507 kubelet[1460]: E1213 02:00:19.992495 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.992786 kubelet[1460]: E1213 02:00:19.992762 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.992786 kubelet[1460]: W1213 02:00:19.992772 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.992876 kubelet[1460]: E1213 02:00:19.992790 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.992987 kubelet[1460]: E1213 02:00:19.992968 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.992987 kubelet[1460]: W1213 02:00:19.992981 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.993078 kubelet[1460]: E1213 02:00:19.993008 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.993146 kubelet[1460]: E1213 02:00:19.993127 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.993146 kubelet[1460]: W1213 02:00:19.993139 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.993217 kubelet[1460]: E1213 02:00:19.993153 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.993320 kubelet[1460]: E1213 02:00:19.993306 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.993408 kubelet[1460]: W1213 02:00:19.993390 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.993496 kubelet[1460]: E1213 02:00:19.993479 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.993718 kubelet[1460]: E1213 02:00:19.993700 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.993718 kubelet[1460]: W1213 02:00:19.993712 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.993718 kubelet[1460]: E1213 02:00:19.993720 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.993927 kubelet[1460]: E1213 02:00:19.993900 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.993927 kubelet[1460]: W1213 02:00:19.993919 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.994001 kubelet[1460]: E1213 02:00:19.993931 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.994111 kubelet[1460]: E1213 02:00:19.994094 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.994111 kubelet[1460]: W1213 02:00:19.994105 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.994187 kubelet[1460]: E1213 02:00:19.994114 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.997290 kubelet[1460]: E1213 02:00:19.994358 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.997290 kubelet[1460]: W1213 02:00:19.994371 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.997290 kubelet[1460]: E1213 02:00:19.994380 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:19.997290 kubelet[1460]: E1213 02:00:19.995039 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:19.997290 kubelet[1460]: W1213 02:00:19.995050 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:19.997290 kubelet[1460]: E1213 02:00:19.995060 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:20.002824 kubelet[1460]: E1213 02:00:19.998866 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:20.002824 kubelet[1460]: W1213 02:00:19.998883 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:20.002824 kubelet[1460]: E1213 02:00:19.998898 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:20.002824 kubelet[1460]: E1213 02:00:19.999797 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:20.002824 kubelet[1460]: W1213 02:00:19.999807 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:20.002824 kubelet[1460]: E1213 02:00:19.999818 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:20.006220 kubelet[1460]: E1213 02:00:20.006187 1460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:20.006220 kubelet[1460]: W1213 02:00:20.006207 1460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:20.006341 kubelet[1460]: E1213 02:00:20.006229 1460 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:20.181426 kubelet[1460]: E1213 02:00:20.180329 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:20.181578 env[1210]: time="2024-12-13T02:00:20.181032122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ktvt6,Uid:1b9c60dd-d412-40c5-8535-0c9da51953f7,Namespace:calico-system,Attempt:0,}" Dec 13 02:00:20.183697 kubelet[1460]: E1213 02:00:20.183670 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:20.183981 env[1210]: time="2024-12-13T02:00:20.183936590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sn5qf,Uid:fe170534-64a3-4fd8-a845-937e894aac1e,Namespace:kube-system,Attempt:0,}" Dec 13 02:00:20.757953 env[1210]: time="2024-12-13T02:00:20.757901644Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.758784 env[1210]: time="2024-12-13T02:00:20.758761227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.761386 env[1210]: time="2024-12-13T02:00:20.761336357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.762494 env[1210]: time="2024-12-13T02:00:20.762448573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.763767 env[1210]: time="2024-12-13T02:00:20.763740667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.765057 env[1210]: time="2024-12-13T02:00:20.765023673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.766299 env[1210]: time="2024-12-13T02:00:20.766267005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.767689 env[1210]: time="2024-12-13T02:00:20.767664046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:20.786025 env[1210]: time="2024-12-13T02:00:20.785941349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:00:20.786025 env[1210]: time="2024-12-13T02:00:20.785981725Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:00:20.786025 env[1210]: time="2024-12-13T02:00:20.785994068Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:00:20.786260 env[1210]: time="2024-12-13T02:00:20.786125414Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7 pid=1578 runtime=io.containerd.runc.v2 Dec 13 02:00:20.788100 env[1210]: time="2024-12-13T02:00:20.788047690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:00:20.788181 env[1210]: time="2024-12-13T02:00:20.788084068Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:00:20.788181 env[1210]: time="2024-12-13T02:00:20.788119685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:00:20.789026 env[1210]: time="2024-12-13T02:00:20.788289483Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40ae2aa12dc56785148b4683bd76885aa12f13ce1c9b8c77757637d9b0f4b952 pid=1594 runtime=io.containerd.runc.v2 Dec 13 02:00:20.797264 systemd[1]: Started cri-containerd-caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7.scope. Dec 13 02:00:20.799984 systemd[1]: Started cri-containerd-40ae2aa12dc56785148b4683bd76885aa12f13ce1c9b8c77757637d9b0f4b952.scope. Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit: BPF prog-id=61 op=LOAD Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1578 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613136343663373032363331656137353432616437303265633161 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1578 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613136343663373032363331656137353432616437303265633161 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit: BPF prog-id=62 op=LOAD Dec 13 02:00:20.809000 audit[1603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021b3b0 items=0 ppid=1578 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613136343663373032363331656137353432616437303265633161 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit: BPF prog-id=63 op=LOAD Dec 13 02:00:20.809000 audit[1603]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021b3f8 items=0 ppid=1578 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613136343663373032363331656137353432616437303265633161 Dec 13 02:00:20.809000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:00:20.809000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { perfmon } for pid=1603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: AVC avc: denied { bpf } for pid=1603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit: BPF prog-id=64 op=LOAD Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.809000 audit[1603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021b808 items=0 ppid=1578 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613136343663373032363331656137353432616437303265633161 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.810000 audit: BPF prog-id=65 op=LOAD Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1594 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430616532616131326463353637383531343862343638336264373638 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1594 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430616532616131326463353637383531343862343638336264373638 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.811000 audit: BPF prog-id=66 op=LOAD Dec 13 02:00:20.811000 audit[1607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002fa8c0 items=0 ppid=1594 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430616532616131326463353637383531343862343638336264373638 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.812000 audit: BPF prog-id=67 op=LOAD Dec 13 02:00:20.812000 audit[1607]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002fa908 items=0 ppid=1594 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430616532616131326463353637383531343862343638336264373638 Dec 13 02:00:20.814000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:00:20.814000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { perfmon } for pid=1607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit[1607]: AVC avc: denied { bpf } for pid=1607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:20.814000 audit: BPF prog-id=68 op=LOAD Dec 13 02:00:20.814000 audit[1607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002fad18 items=0 ppid=1594 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:20.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430616532616131326463353637383531343862343638336264373638 Dec 13 02:00:20.822147 env[1210]: time="2024-12-13T02:00:20.822101575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ktvt6,Uid:1b9c60dd-d412-40c5-8535-0c9da51953f7,Namespace:calico-system,Attempt:0,} returns sandbox id \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\"" Dec 13 02:00:20.822922 kubelet[1460]: E1213 02:00:20.822893 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:20.824008 env[1210]: time="2024-12-13T02:00:20.823979057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:00:20.827416 env[1210]: time="2024-12-13T02:00:20.827381128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sn5qf,Uid:fe170534-64a3-4fd8-a845-937e894aac1e,Namespace:kube-system,Attempt:0,} returns sandbox id \"40ae2aa12dc56785148b4683bd76885aa12f13ce1c9b8c77757637d9b0f4b952\"" Dec 13 02:00:20.827856 kubelet[1460]: E1213 02:00:20.827839 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:20.865976 kubelet[1460]: E1213 02:00:20.865957 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:20.999480 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1466051885.mount: Deactivated successfully. Dec 13 02:00:21.323150 kubelet[1460]: E1213 02:00:21.323105 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:21.866590 kubelet[1460]: E1213 02:00:21.866520 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:22.223513 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount165299128.mount: Deactivated successfully. Dec 13 02:00:22.346503 env[1210]: time="2024-12-13T02:00:22.346459575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:22.348158 env[1210]: time="2024-12-13T02:00:22.348128145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:22.349669 env[1210]: time="2024-12-13T02:00:22.349639520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:22.351062 env[1210]: time="2024-12-13T02:00:22.351024688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:22.351503 env[1210]: time="2024-12-13T02:00:22.351472418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:00:22.352385 env[1210]: time="2024-12-13T02:00:22.352350244Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:00:22.353658 env[1210]: time="2024-12-13T02:00:22.353621168Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:00:22.366942 env[1210]: time="2024-12-13T02:00:22.366900617Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587\"" Dec 13 02:00:22.367451 env[1210]: time="2024-12-13T02:00:22.367418137Z" level=info msg="StartContainer for \"0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587\"" Dec 13 02:00:22.382977 systemd[1]: Started cri-containerd-0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587.scope. Dec 13 02:00:22.397001 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 02:00:22.397115 kernel: audit: type=1400 audit(1734055222.392:451): avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5a6dc5a1b8 items=0 ppid=1578 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:22.402650 kernel: audit: type=1300 audit(1734055222.392:451): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5a6dc5a1b8 items=0 ppid=1578 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:22.402702 kernel: audit: type=1327 audit(1734055222.392:451): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633533376565633861366231383462363134633533303437623063 Dec 13 02:00:22.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633533376565633861366231383462363134633533303437623063 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.409482 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.409539 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.415541 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.415583 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.421910 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.425309 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.429245 kernel: audit: type=1400 audit(1734055222.392:452): avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.429367 env[1210]: time="2024-12-13T02:00:22.428019077Z" level=info msg="StartContainer for \"0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587\" returns successfully" Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.392000 audit: BPF prog-id=69 op=LOAD Dec 13 02:00:22.392000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ba1a8 items=0 ppid=1578 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:22.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633533376565633861366231383462363134633533303437623063 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.396000 audit: BPF prog-id=70 op=LOAD Dec 13 02:00:22.396000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ba1f8 items=0 ppid=1578 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:22.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633533376565633861366231383462363134633533303437623063 Dec 13 02:00:22.405000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:00:22.405000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:22.405000 audit: BPF prog-id=71 op=LOAD Dec 13 02:00:22.405000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ba288 items=0 ppid=1578 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:22.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063633533376565633861366231383462363134633533303437623063 Dec 13 02:00:22.435424 systemd[1]: cri-containerd-0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587.scope: Deactivated successfully. Dec 13 02:00:22.438000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:00:22.533681 env[1210]: time="2024-12-13T02:00:22.533563879Z" level=info msg="shim disconnected" id=0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587 Dec 13 02:00:22.533681 env[1210]: time="2024-12-13T02:00:22.533606359Z" level=warning msg="cleaning up after shim disconnected" id=0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587 namespace=k8s.io Dec 13 02:00:22.533681 env[1210]: time="2024-12-13T02:00:22.533615035Z" level=info msg="cleaning up dead shim" Dec 13 02:00:22.539659 env[1210]: time="2024-12-13T02:00:22.539619227Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1705 runtime=io.containerd.runc.v2\n" Dec 13 02:00:22.866913 kubelet[1460]: E1213 02:00:22.866814 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:23.184253 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587-rootfs.mount: Deactivated successfully. Dec 13 02:00:23.323148 kubelet[1460]: E1213 02:00:23.323106 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:23.332316 kubelet[1460]: E1213 02:00:23.332180 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:23.473653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1409404987.mount: Deactivated successfully. Dec 13 02:00:23.867183 kubelet[1460]: E1213 02:00:23.867064 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:24.027279 env[1210]: time="2024-12-13T02:00:24.027208379Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.029211 env[1210]: time="2024-12-13T02:00:24.029170149Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.030439 env[1210]: time="2024-12-13T02:00:24.030412079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.031712 env[1210]: time="2024-12-13T02:00:24.031673535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.032063 env[1210]: time="2024-12-13T02:00:24.032035033Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:00:24.033061 env[1210]: time="2024-12-13T02:00:24.033034147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:00:24.033970 env[1210]: time="2024-12-13T02:00:24.033934185Z" level=info msg="CreateContainer within sandbox \"40ae2aa12dc56785148b4683bd76885aa12f13ce1c9b8c77757637d9b0f4b952\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:00:24.133476 env[1210]: time="2024-12-13T02:00:24.133387541Z" level=info msg="CreateContainer within sandbox \"40ae2aa12dc56785148b4683bd76885aa12f13ce1c9b8c77757637d9b0f4b952\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"22668001cdb29eb5e9b4c67bf9e439ea72729441660ed8ee68954e92ce89acd5\"" Dec 13 02:00:24.133839 env[1210]: time="2024-12-13T02:00:24.133813610Z" level=info msg="StartContainer for \"22668001cdb29eb5e9b4c67bf9e439ea72729441660ed8ee68954e92ce89acd5\"" Dec 13 02:00:24.146953 systemd[1]: Started cri-containerd-22668001cdb29eb5e9b4c67bf9e439ea72729441660ed8ee68954e92ce89acd5.scope. Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdcf8ebc5a8 items=0 ppid=1594 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363638303031636462323965623565396234633637626639653433 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit: BPF prog-id=72 op=LOAD Dec 13 02:00:24.156000 audit[1730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000257ba8 items=0 ppid=1594 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363638303031636462323965623565396234633637626639653433 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.156000 audit: BPF prog-id=73 op=LOAD Dec 13 02:00:24.156000 audit[1730]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000257bf8 items=0 ppid=1594 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363638303031636462323965623565396234633637626639653433 Dec 13 02:00:24.157000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:00:24.157000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.157000 audit: BPF prog-id=74 op=LOAD Dec 13 02:00:24.157000 audit[1730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000257c88 items=0 ppid=1594 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232363638303031636462323965623565396234633637626639653433 Dec 13 02:00:24.168983 env[1210]: time="2024-12-13T02:00:24.168948183Z" level=info msg="StartContainer for \"22668001cdb29eb5e9b4c67bf9e439ea72729441660ed8ee68954e92ce89acd5\" returns successfully" Dec 13 02:00:24.212000 audit[1781]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.212000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6b0e3f00 a2=0 a3=7ffc6b0e3eec items=0 ppid=1740 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:00:24.213000 audit[1782]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.213000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdeaa8e0a0 a2=0 a3=7ffdeaa8e08c items=0 ppid=1740 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:00:24.213000 audit[1783]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.213000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb350e010 a2=0 a3=7fffb350dffc items=0 ppid=1740 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:00:24.214000 audit[1784]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.214000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc615ee150 a2=0 a3=7ffc615ee13c items=0 ppid=1740 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:00:24.217000 audit[1785]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.217000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffa28e260 a2=0 a3=7ffffa28e24c items=0 ppid=1740 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:00:24.217000 audit[1786]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.217000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4e3d67c0 a2=0 a3=7fff4e3d67ac items=0 ppid=1740 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:00:24.218000 audit[1789]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.218000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe1d138350 a2=0 a3=7ffe1d13833c items=0 ppid=1740 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:00:24.220000 audit[1791]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.220000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffda73c74e0 a2=0 a3=7ffda73c74cc items=0 ppid=1740 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:00:24.222000 audit[1794]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.222000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3c63e6f0 a2=0 a3=7ffe3c63e6dc items=0 ppid=1740 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:00:24.223000 audit[1795]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.223000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff117498c0 a2=0 a3=7fff117498ac items=0 ppid=1740 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:00:24.224000 audit[1797]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.224000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4af05550 a2=0 a3=7ffc4af0553c items=0 ppid=1740 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:00:24.225000 audit[1798]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.225000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4e784730 a2=0 a3=7ffc4e78471c items=0 ppid=1740 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:00:24.227000 audit[1800]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.227000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe39011e30 a2=0 a3=7ffe39011e1c items=0 ppid=1740 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:00:24.229000 audit[1803]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.229000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd30a3b950 a2=0 a3=7ffd30a3b93c items=0 ppid=1740 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:00:24.230000 audit[1804]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.230000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4bc91f00 a2=0 a3=7ffd4bc91eec items=0 ppid=1740 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:00:24.232000 audit[1806]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.232000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde562c9b0 a2=0 a3=7ffde562c99c items=0 ppid=1740 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:00:24.233000 audit[1807]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.233000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeff243080 a2=0 a3=7ffeff24306c items=0 ppid=1740 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:00:24.235000 audit[1809]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.235000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6b031d80 a2=0 a3=7ffd6b031d6c items=0 ppid=1740 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:00:24.237000 audit[1812]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.237000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6ed5ac60 a2=0 a3=7fff6ed5ac4c items=0 ppid=1740 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:00:24.240000 audit[1815]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.240000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4e2b9520 a2=0 a3=7ffe4e2b950c items=0 ppid=1740 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:00:24.240000 audit[1816]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.240000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe21c3b2b0 a2=0 a3=7ffe21c3b29c items=0 ppid=1740 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:00:24.242000 audit[1818]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.242000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffc5958060 a2=0 a3=7fffc595804c items=0 ppid=1740 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:24.260000 audit[1823]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.260000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe50522a50 a2=0 a3=7ffe50522a3c items=0 ppid=1740 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:24.261000 audit[1824]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.261000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0fa3d470 a2=0 a3=7ffd0fa3d45c items=0 ppid=1740 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:00:24.263000 audit[1826]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:24.263000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc35054420 a2=0 a3=7ffc3505440c items=0 ppid=1740 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:00:24.277000 audit[1832]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:24.277000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffff7397630 a2=0 a3=7ffff739761c items=0 ppid=1740 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:24.297000 audit[1832]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:24.297000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffff7397630 a2=0 a3=7ffff739761c items=0 ppid=1740 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:24.298000 audit[1838]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.298000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee32e6110 a2=0 a3=7ffee32e60fc items=0 ppid=1740 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:00:24.300000 audit[1840]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.300000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2e52b890 a2=0 a3=7ffe2e52b87c items=0 ppid=1740 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:00:24.303000 audit[1843]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.303000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfa0a0660 a2=0 a3=7ffdfa0a064c items=0 ppid=1740 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:00:24.304000 audit[1844]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.304000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0f9e2ce0 a2=0 a3=7ffc0f9e2ccc items=0 ppid=1740 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:00:24.306000 audit[1846]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.306000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdeefbe860 a2=0 a3=7ffdeefbe84c items=0 ppid=1740 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:00:24.306000 audit[1847]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.306000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffef52c870 a2=0 a3=7fffef52c85c items=0 ppid=1740 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:00:24.308000 audit[1849]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.308000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd35e24740 a2=0 a3=7ffd35e2472c items=0 ppid=1740 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:00:24.311000 audit[1852]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.311000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd798cb430 a2=0 a3=7ffd798cb41c items=0 ppid=1740 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:00:24.312000 audit[1853]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.312000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaf9f8e40 a2=0 a3=7fffaf9f8e2c items=0 ppid=1740 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:00:24.313000 audit[1855]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.313000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc358bd330 a2=0 a3=7ffc358bd31c items=0 ppid=1740 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:00:24.314000 audit[1856]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.314000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc78533520 a2=0 a3=7ffc7853350c items=0 ppid=1740 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:00:24.316000 audit[1858]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.316000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1b51fee0 a2=0 a3=7fff1b51fecc items=0 ppid=1740 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:00:24.319000 audit[1861]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.319000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff95215010 a2=0 a3=7fff95214ffc items=0 ppid=1740 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:00:24.321000 audit[1864]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.321000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce81c8440 a2=0 a3=7ffce81c842c items=0 ppid=1740 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:00:24.322000 audit[1865]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.322000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1b171e50 a2=0 a3=7fff1b171e3c items=0 ppid=1740 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:00:24.324000 audit[1867]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.324000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc317b5b60 a2=0 a3=7ffc317b5b4c items=0 ppid=1740 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:24.326000 audit[1870]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.326000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd511e910 a2=0 a3=7ffcd511e8fc items=0 ppid=1740 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:24.327000 audit[1871]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.327000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5c561af0 a2=0 a3=7fff5c561adc items=0 ppid=1740 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:00:24.329000 audit[1873]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.329000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe90a88a90 a2=0 a3=7ffe90a88a7c items=0 ppid=1740 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:00:24.330000 audit[1874]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.330000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc0091810 a2=0 a3=7fffc00917fc items=0 ppid=1740 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:00:24.332000 audit[1876]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.332000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa2fc3270 a2=0 a3=7fffa2fc325c items=0 ppid=1740 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:00:24.335163 kubelet[1460]: E1213 02:00:24.335139 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:24.335000 audit[1879]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:24.335000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9766d3d0 a2=0 a3=7ffd9766d3bc items=0 ppid=1740 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:00:24.337000 audit[1881]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:00:24.337000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcbdf60600 a2=0 a3=7ffcbdf605ec items=0 ppid=1740 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.337000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:24.337000 audit[1881]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:00:24.337000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcbdf60600 a2=0 a3=7ffcbdf605ec items=0 ppid=1740 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.337000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:24.343031 kubelet[1460]: I1213 02:00:24.342975 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sn5qf" podStartSLOduration=3.138253276 podStartE2EDuration="6.342956783s" podCreationTimestamp="2024-12-13 02:00:18 +0000 UTC" firstStartedPulling="2024-12-13 02:00:20.828190156 +0000 UTC m=+3.355961636" lastFinishedPulling="2024-12-13 02:00:24.032893663 +0000 UTC m=+6.560665143" observedRunningTime="2024-12-13 02:00:24.342851896 +0000 UTC m=+6.870623376" watchObservedRunningTime="2024-12-13 02:00:24.342956783 +0000 UTC m=+6.870728263" Dec 13 02:00:24.867305 kubelet[1460]: E1213 02:00:24.867276 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:25.323548 kubelet[1460]: E1213 02:00:25.323450 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:25.336806 kubelet[1460]: E1213 02:00:25.336766 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:25.868251 kubelet[1460]: E1213 02:00:25.868174 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:26.868415 kubelet[1460]: E1213 02:00:26.868373 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:27.323567 kubelet[1460]: E1213 02:00:27.323408 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:27.868598 kubelet[1460]: E1213 02:00:27.868562 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:28.869168 kubelet[1460]: E1213 02:00:28.869098 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:29.323260 kubelet[1460]: E1213 02:00:29.323033 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:29.870059 kubelet[1460]: E1213 02:00:29.870034 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:30.870955 kubelet[1460]: E1213 02:00:30.870918 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:31.323279 kubelet[1460]: E1213 02:00:31.323183 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:31.871174 kubelet[1460]: E1213 02:00:31.871146 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:32.445000 audit[1883]: NETFILTER_CFG table=filter:65 family=2 entries=17 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:32.448026 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 02:00:32.448079 kernel: audit: type=1325 audit(1734055232.445:515): table=filter:65 family=2 entries=17 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:32.445000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe66da3960 a2=0 a3=7ffe66da394c items=0 ppid=1740 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.455828 kernel: audit: type=1300 audit(1734055232.445:515): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe66da3960 a2=0 a3=7ffe66da394c items=0 ppid=1740 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.455867 kernel: audit: type=1327 audit(1734055232.445:515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:32.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:32.457000 audit[1883]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:32.457000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe66da3960 a2=0 a3=7ffe66da394c items=0 ppid=1740 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.466575 kernel: audit: type=1325 audit(1734055232.457:516): table=nat:66 family=2 entries=19 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:32.466616 kernel: audit: type=1300 audit(1734055232.457:516): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe66da3960 a2=0 a3=7ffe66da394c items=0 ppid=1740 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.466648 kernel: audit: type=1327 audit(1734055232.457:516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:32.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:32.872017 kubelet[1460]: E1213 02:00:32.871910 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:32.911817 env[1210]: time="2024-12-13T02:00:32.911755210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:32.913729 env[1210]: time="2024-12-13T02:00:32.913698795Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:32.915602 env[1210]: time="2024-12-13T02:00:32.915568793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:32.917334 env[1210]: time="2024-12-13T02:00:32.917288869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:32.917814 env[1210]: time="2024-12-13T02:00:32.917755104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:00:32.919720 env[1210]: time="2024-12-13T02:00:32.919688741Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:00:32.935352 env[1210]: time="2024-12-13T02:00:32.935287359Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61\"" Dec 13 02:00:32.935726 env[1210]: time="2024-12-13T02:00:32.935678713Z" level=info msg="StartContainer for \"77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61\"" Dec 13 02:00:32.952643 systemd[1]: Started cri-containerd-77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61.scope. Dec 13 02:00:32.963000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.963000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdbd02ac488 items=0 ppid=1578 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.974173 kernel: audit: type=1400 audit(1734055232.963:517): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.974233 kernel: audit: type=1300 audit(1734055232.963:517): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdbd02ac488 items=0 ppid=1578 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.974274 kernel: audit: type=1327 audit(1734055232.963:517): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737653231383563336334323633393265306234303330363862313466 Dec 13 02:00:32.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737653231383563336334323633393265306234303330363862313466 Dec 13 02:00:32.978563 kernel: audit: type=1400 audit(1734055232.966:518): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.966000 audit: BPF prog-id=75 op=LOAD Dec 13 02:00:32.966000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027dba8 items=0 ppid=1578 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737653231383563336334323633393265306234303330363862313466 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.972000 audit: BPF prog-id=76 op=LOAD Dec 13 02:00:32.972000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027dbf8 items=0 ppid=1578 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737653231383563336334323633393265306234303330363862313466 Dec 13 02:00:32.977000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:00:32.977000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:32.977000 audit: BPF prog-id=77 op=LOAD Dec 13 02:00:32.977000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027dc88 items=0 ppid=1578 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737653231383563336334323633393265306234303330363862313466 Dec 13 02:00:32.994568 env[1210]: time="2024-12-13T02:00:32.993713580Z" level=info msg="StartContainer for \"77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61\" returns successfully" Dec 13 02:00:33.322986 kubelet[1460]: E1213 02:00:33.322860 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:33.350011 kubelet[1460]: E1213 02:00:33.349989 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:33.872596 kubelet[1460]: E1213 02:00:33.872558 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:33.943421 systemd[1]: cri-containerd-77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61.scope: Deactivated successfully. Dec 13 02:00:33.947000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:00:33.957889 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61-rootfs.mount: Deactivated successfully. Dec 13 02:00:33.989454 kubelet[1460]: I1213 02:00:33.988862 1460 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:00:34.351230 kubelet[1460]: E1213 02:00:34.351125 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:34.587185 env[1210]: time="2024-12-13T02:00:34.587135264Z" level=info msg="shim disconnected" id=77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61 Dec 13 02:00:34.587185 env[1210]: time="2024-12-13T02:00:34.587180529Z" level=warning msg="cleaning up after shim disconnected" id=77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61 namespace=k8s.io Dec 13 02:00:34.587185 env[1210]: time="2024-12-13T02:00:34.587188894Z" level=info msg="cleaning up dead shim" Dec 13 02:00:34.593138 env[1210]: time="2024-12-13T02:00:34.593105292Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1933 runtime=io.containerd.runc.v2\n" Dec 13 02:00:34.595818 kubelet[1460]: I1213 02:00:34.595777 1460 topology_manager.go:215] "Topology Admit Handler" podUID="5159e81a-587d-4c37-a3bb-a79104fceca2" podNamespace="default" podName="nginx-deployment-85f456d6dd-xz4sf" Dec 13 02:00:34.600111 systemd[1]: Created slice kubepods-besteffort-pod5159e81a_587d_4c37_a3bb_a79104fceca2.slice. Dec 13 02:00:34.659091 kubelet[1460]: I1213 02:00:34.659001 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l95bs\" (UniqueName: \"kubernetes.io/projected/5159e81a-587d-4c37-a3bb-a79104fceca2-kube-api-access-l95bs\") pod \"nginx-deployment-85f456d6dd-xz4sf\" (UID: \"5159e81a-587d-4c37-a3bb-a79104fceca2\") " pod="default/nginx-deployment-85f456d6dd-xz4sf" Dec 13 02:00:34.872859 kubelet[1460]: E1213 02:00:34.872809 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:34.902507 env[1210]: time="2024-12-13T02:00:34.902456607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xz4sf,Uid:5159e81a-587d-4c37-a3bb-a79104fceca2,Namespace:default,Attempt:0,}" Dec 13 02:00:34.956818 env[1210]: time="2024-12-13T02:00:34.956668513Z" level=error msg="Failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.957873 env[1210]: time="2024-12-13T02:00:34.957805365Z" level=error msg="encountered an error cleaning up failed sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.958072 env[1210]: time="2024-12-13T02:00:34.957882420Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xz4sf,Uid:5159e81a-587d-4c37-a3bb-a79104fceca2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.958140 kubelet[1460]: E1213 02:00:34.958087 1460 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.958178 kubelet[1460]: E1213 02:00:34.958159 1460 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-xz4sf" Dec 13 02:00:34.958211 kubelet[1460]: E1213 02:00:34.958178 1460 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-xz4sf" Dec 13 02:00:34.958238 kubelet[1460]: E1213 02:00:34.958214 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-xz4sf_default(5159e81a-587d-4c37-a3bb-a79104fceca2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-xz4sf_default(5159e81a-587d-4c37-a3bb-a79104fceca2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xz4sf" podUID="5159e81a-587d-4c37-a3bb-a79104fceca2" Dec 13 02:00:34.958559 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b-shm.mount: Deactivated successfully. Dec 13 02:00:35.326884 systemd[1]: Created slice kubepods-besteffort-podfd828415_db04_43cc_8ba4_01f937db2391.slice. Dec 13 02:00:35.329014 env[1210]: time="2024-12-13T02:00:35.328981205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r5cpj,Uid:fd828415-db04-43cc-8ba4-01f937db2391,Namespace:calico-system,Attempt:0,}" Dec 13 02:00:35.354256 kubelet[1460]: E1213 02:00:35.354228 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:35.355008 kubelet[1460]: I1213 02:00:35.354984 1460 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:00:35.355153 env[1210]: time="2024-12-13T02:00:35.355127017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:00:35.355478 env[1210]: time="2024-12-13T02:00:35.355435676Z" level=info msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\"" Dec 13 02:00:35.381188 env[1210]: time="2024-12-13T02:00:35.381124431Z" level=error msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\" failed" error="failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:35.381422 kubelet[1460]: E1213 02:00:35.381383 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:00:35.381481 kubelet[1460]: E1213 02:00:35.381440 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b"} Dec 13 02:00:35.381510 kubelet[1460]: E1213 02:00:35.381501 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:35.381582 kubelet[1460]: E1213 02:00:35.381537 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xz4sf" podUID="5159e81a-587d-4c37-a3bb-a79104fceca2" Dec 13 02:00:35.384893 env[1210]: time="2024-12-13T02:00:35.384849408Z" level=error msg="Failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:35.385260 env[1210]: time="2024-12-13T02:00:35.385215935Z" level=error msg="encountered an error cleaning up failed sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:35.385323 env[1210]: time="2024-12-13T02:00:35.385276058Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r5cpj,Uid:fd828415-db04-43cc-8ba4-01f937db2391,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:35.385559 kubelet[1460]: E1213 02:00:35.385497 1460 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:35.385624 kubelet[1460]: E1213 02:00:35.385586 1460 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:35.385624 kubelet[1460]: E1213 02:00:35.385612 1460 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r5cpj" Dec 13 02:00:35.385680 kubelet[1460]: E1213 02:00:35.385656 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-r5cpj_calico-system(fd828415-db04-43cc-8ba4-01f937db2391)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-r5cpj_calico-system(fd828415-db04-43cc-8ba4-01f937db2391)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:35.386343 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247-shm.mount: Deactivated successfully. Dec 13 02:00:35.873142 kubelet[1460]: E1213 02:00:35.873101 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:36.356515 kubelet[1460]: I1213 02:00:36.356434 1460 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:00:36.356913 env[1210]: time="2024-12-13T02:00:36.356871393Z" level=info msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\"" Dec 13 02:00:36.378324 env[1210]: time="2024-12-13T02:00:36.378263989Z" level=error msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\" failed" error="failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:36.378494 kubelet[1460]: E1213 02:00:36.378462 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:00:36.378581 kubelet[1460]: E1213 02:00:36.378505 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247"} Dec 13 02:00:36.378581 kubelet[1460]: E1213 02:00:36.378546 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:36.378581 kubelet[1460]: E1213 02:00:36.378567 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:36.873727 kubelet[1460]: E1213 02:00:36.873688 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:37.864791 kubelet[1460]: E1213 02:00:37.864726 1460 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:37.874353 kubelet[1460]: E1213 02:00:37.874297 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:38.874454 kubelet[1460]: E1213 02:00:38.874409 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:39.875394 kubelet[1460]: E1213 02:00:39.875328 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:40.876015 kubelet[1460]: E1213 02:00:40.875944 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:41.876674 kubelet[1460]: E1213 02:00:41.876612 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:41.882038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2346301804.mount: Deactivated successfully. Dec 13 02:00:42.877035 kubelet[1460]: E1213 02:00:42.876998 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:43.877260 kubelet[1460]: E1213 02:00:43.877222 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:44.877359 kubelet[1460]: E1213 02:00:44.877324 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:45.799313 env[1210]: time="2024-12-13T02:00:45.799256821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.869831 env[1210]: time="2024-12-13T02:00:45.869772721Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.876097 env[1210]: time="2024-12-13T02:00:45.876053238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.877646 kubelet[1460]: E1213 02:00:45.877603 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:45.878085 env[1210]: time="2024-12-13T02:00:45.878050471Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.878520 env[1210]: time="2024-12-13T02:00:45.878487506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:00:45.886464 env[1210]: time="2024-12-13T02:00:45.886419865Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:00:45.901393 env[1210]: time="2024-12-13T02:00:45.901345524Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\"" Dec 13 02:00:45.902021 env[1210]: time="2024-12-13T02:00:45.901984847Z" level=info msg="StartContainer for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\"" Dec 13 02:00:45.917820 systemd[1]: Started cri-containerd-cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88.scope. Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.932512 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 02:00:45.932574 kernel: audit: type=1400 audit(1734055245.930:524): avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3d6c5a8a08 items=0 ppid=1578 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.941067 kernel: audit: type=1300 audit(1734055245.930:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3d6c5a8a08 items=0 ppid=1578 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.941111 kernel: audit: type=1327 audit(1734055245.930:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364336261346335656561393730336338376564346162623665646333 Dec 13 02:00:45.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364336261346335656561393730336338376564346162623665646333 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948276 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948328 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.958634 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.958769 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.958805 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.961744 env[1210]: time="2024-12-13T02:00:45.961706110Z" level=info msg="StartContainer for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\" returns successfully" Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.969399 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.969475 kernel: audit: type=1400 audit(1734055245.930:525): avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.930000 audit: BPF prog-id=78 op=LOAD Dec 13 02:00:45.930000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f8758 items=0 ppid=1578 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364336261346335656561393730336338376564346162623665646333 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.935000 audit: BPF prog-id=79 op=LOAD Dec 13 02:00:45.935000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002f87a8 items=0 ppid=1578 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364336261346335656561393730336338376564346162623665646333 Dec 13 02:00:45.940000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:00:45.940000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.940000 audit: BPF prog-id=80 op=LOAD Dec 13 02:00:45.940000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002f8838 items=0 ppid=1578 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364336261346335656561393730336338376564346162623665646333 Dec 13 02:00:46.027073 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:00:46.027175 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:00:46.046316 systemd[1]: cri-containerd-cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88.scope: Deactivated successfully. Dec 13 02:00:46.051000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:00:46.373246 kubelet[1460]: E1213 02:00:46.373211 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:46.522520 env[1210]: time="2024-12-13T02:00:46.522458059Z" level=info msg="shim disconnected" id=cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 Dec 13 02:00:46.522520 env[1210]: time="2024-12-13T02:00:46.522512513Z" level=warning msg="cleaning up after shim disconnected" id=cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 namespace=k8s.io Dec 13 02:00:46.522520 env[1210]: time="2024-12-13T02:00:46.522523784Z" level=info msg="cleaning up dead shim" Dec 13 02:00:46.523638 env[1210]: time="2024-12-13T02:00:46.523580242Z" level=error msg="ExecSync for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"8a3e76c2fd836e2435a41240df01f101d517382ddaff8f1d5caeac1c33e9648a\": task cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 not found: not found" Dec 13 02:00:46.523830 kubelet[1460]: E1213 02:00:46.523791 1460 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"8a3e76c2fd836e2435a41240df01f101d517382ddaff8f1d5caeac1c33e9648a\": task cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 not found: not found" containerID="cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 02:00:46.524706 env[1210]: time="2024-12-13T02:00:46.524677990Z" level=error msg="ExecSync for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 not found: not found" Dec 13 02:00:46.524811 kubelet[1460]: E1213 02:00:46.524785 1460 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 not found: not found" containerID="cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 02:00:46.525594 env[1210]: time="2024-12-13T02:00:46.525551330Z" level=error msg="ExecSync for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 not found: not found" Dec 13 02:00:46.525683 kubelet[1460]: E1213 02:00:46.525649 1460 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88 not found: not found" containerID="cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 02:00:46.528894 env[1210]: time="2024-12-13T02:00:46.528846026Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2127 runtime=io.containerd.runc.v2\n" Dec 13 02:00:46.878082 kubelet[1460]: E1213 02:00:46.878049 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:46.883694 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88-rootfs.mount: Deactivated successfully. Dec 13 02:00:47.323773 env[1210]: time="2024-12-13T02:00:47.323646809Z" level=info msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\"" Dec 13 02:00:47.341750 env[1210]: time="2024-12-13T02:00:47.341689060Z" level=error msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\" failed" error="failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:47.341979 kubelet[1460]: E1213 02:00:47.341923 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:00:47.342042 kubelet[1460]: E1213 02:00:47.341989 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247"} Dec 13 02:00:47.342042 kubelet[1460]: E1213 02:00:47.342029 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:47.342145 kubelet[1460]: E1213 02:00:47.342056 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:47.375771 kubelet[1460]: I1213 02:00:47.375749 1460 scope.go:117] "RemoveContainer" containerID="cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88" Dec 13 02:00:47.375832 kubelet[1460]: E1213 02:00:47.375802 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:47.377666 env[1210]: time="2024-12-13T02:00:47.377636298Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 02:00:47.394215 env[1210]: time="2024-12-13T02:00:47.394175700Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a\"" Dec 13 02:00:47.394625 env[1210]: time="2024-12-13T02:00:47.394602405Z" level=info msg="StartContainer for \"f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a\"" Dec 13 02:00:47.408929 systemd[1]: Started cri-containerd-f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a.scope. Dec 13 02:00:47.418000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.418000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8662739968 items=0 ppid=1578 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631636461396563613466303364613331383362303830376130366662 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit: BPF prog-id=81 op=LOAD Dec 13 02:00:47.419000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a6bf8 items=0 ppid=1578 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631636461396563613466303364613331383362303830376130366662 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit: BPF prog-id=82 op=LOAD Dec 13 02:00:47.419000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a6c48 items=0 ppid=1578 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631636461396563613466303364613331383362303830376130366662 Dec 13 02:00:47.419000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:00:47.419000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.419000 audit: BPF prog-id=83 op=LOAD Dec 13 02:00:47.419000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a6cd8 items=0 ppid=1578 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631636461396563613466303364613331383362303830376130366662 Dec 13 02:00:47.430307 env[1210]: time="2024-12-13T02:00:47.430250101Z" level=info msg="StartContainer for \"f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a\" returns successfully" Dec 13 02:00:47.470982 systemd[1]: cri-containerd-f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a.scope: Deactivated successfully. Dec 13 02:00:47.476000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:00:47.491873 env[1210]: time="2024-12-13T02:00:47.491826413Z" level=info msg="shim disconnected" id=f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a Dec 13 02:00:47.491873 env[1210]: time="2024-12-13T02:00:47.491864647Z" level=warning msg="cleaning up after shim disconnected" id=f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a namespace=k8s.io Dec 13 02:00:47.491873 env[1210]: time="2024-12-13T02:00:47.491873784Z" level=info msg="cleaning up dead shim" Dec 13 02:00:47.497225 env[1210]: time="2024-12-13T02:00:47.497191665Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2213 runtime=io.containerd.runc.v2\n" Dec 13 02:00:47.878297 kubelet[1460]: E1213 02:00:47.878267 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:47.883223 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a-rootfs.mount: Deactivated successfully. Dec 13 02:00:48.378681 kubelet[1460]: I1213 02:00:48.378654 1460 scope.go:117] "RemoveContainer" containerID="cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88" Dec 13 02:00:48.378843 kubelet[1460]: I1213 02:00:48.378829 1460 scope.go:117] "RemoveContainer" containerID="f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a" Dec 13 02:00:48.378890 kubelet[1460]: E1213 02:00:48.378879 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:48.379266 kubelet[1460]: E1213 02:00:48.379248 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ktvt6_calico-system(1b9c60dd-d412-40c5-8535-0c9da51953f7)\"" pod="calico-system/calico-node-ktvt6" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" Dec 13 02:00:48.379615 env[1210]: time="2024-12-13T02:00:48.379582048Z" level=info msg="RemoveContainer for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\"" Dec 13 02:00:48.382452 env[1210]: time="2024-12-13T02:00:48.382422184Z" level=info msg="RemoveContainer for \"cd3ba4c5eea9703c87ed4abb6edc3c819748358e9098d47e6e5cf7ce50f7da88\" returns successfully" Dec 13 02:00:48.878794 kubelet[1460]: E1213 02:00:48.878731 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:49.382140 kubelet[1460]: I1213 02:00:49.382107 1460 scope.go:117] "RemoveContainer" containerID="f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a" Dec 13 02:00:49.382284 kubelet[1460]: E1213 02:00:49.382177 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:49.383009 kubelet[1460]: E1213 02:00:49.382985 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ktvt6_calico-system(1b9c60dd-d412-40c5-8535-0c9da51953f7)\"" pod="calico-system/calico-node-ktvt6" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" Dec 13 02:00:49.879298 kubelet[1460]: E1213 02:00:49.879157 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:50.323667 env[1210]: time="2024-12-13T02:00:50.323576993Z" level=info msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\"" Dec 13 02:00:50.342301 env[1210]: time="2024-12-13T02:00:50.342233968Z" level=error msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\" failed" error="failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:50.342467 kubelet[1460]: E1213 02:00:50.342428 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:00:50.342514 kubelet[1460]: E1213 02:00:50.342467 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b"} Dec 13 02:00:50.342514 kubelet[1460]: E1213 02:00:50.342495 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:50.342632 kubelet[1460]: E1213 02:00:50.342515 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xz4sf" podUID="5159e81a-587d-4c37-a3bb-a79104fceca2" Dec 13 02:00:50.879854 kubelet[1460]: E1213 02:00:50.879824 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:51.372135 kubelet[1460]: I1213 02:00:51.372017 1460 scope.go:117] "RemoveContainer" containerID="f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a" Dec 13 02:00:51.372135 kubelet[1460]: E1213 02:00:51.372092 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:51.372480 kubelet[1460]: E1213 02:00:51.372434 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ktvt6_calico-system(1b9c60dd-d412-40c5-8535-0c9da51953f7)\"" pod="calico-system/calico-node-ktvt6" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" Dec 13 02:00:51.706756 update_engine[1199]: I1213 02:00:51.706562 1199 update_attempter.cc:509] Updating boot flags... Dec 13 02:00:51.880166 kubelet[1460]: E1213 02:00:51.880124 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:52.880613 kubelet[1460]: E1213 02:00:52.880571 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:53.881322 kubelet[1460]: E1213 02:00:53.881283 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:54.881901 kubelet[1460]: E1213 02:00:54.881850 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:55.135682 kubelet[1460]: I1213 02:00:55.135565 1460 scope.go:117] "RemoveContainer" containerID="f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a" Dec 13 02:00:55.135682 kubelet[1460]: E1213 02:00:55.135638 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:55.136125 kubelet[1460]: E1213 02:00:55.136090 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-ktvt6_calico-system(1b9c60dd-d412-40c5-8535-0c9da51953f7)\"" pod="calico-system/calico-node-ktvt6" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" Dec 13 02:00:55.882741 kubelet[1460]: E1213 02:00:55.882703 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:56.883401 kubelet[1460]: E1213 02:00:56.883347 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:57.865051 kubelet[1460]: E1213 02:00:57.865005 1460 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:57.883516 kubelet[1460]: E1213 02:00:57.883464 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:58.883664 kubelet[1460]: E1213 02:00:58.883599 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:00:59.323880 env[1210]: time="2024-12-13T02:00:59.323756930Z" level=info msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\"" Dec 13 02:00:59.345918 env[1210]: time="2024-12-13T02:00:59.345850488Z" level=error msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\" failed" error="failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:59.346150 kubelet[1460]: E1213 02:00:59.346110 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:00:59.346215 kubelet[1460]: E1213 02:00:59.346160 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247"} Dec 13 02:00:59.346215 kubelet[1460]: E1213 02:00:59.346193 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:59.346306 kubelet[1460]: E1213 02:00:59.346214 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:00:59.884370 kubelet[1460]: E1213 02:00:59.884307 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:00.885190 kubelet[1460]: E1213 02:01:00.885127 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:01.323950 env[1210]: time="2024-12-13T02:01:01.323813218Z" level=info msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\"" Dec 13 02:01:01.342941 env[1210]: time="2024-12-13T02:01:01.342871723Z" level=error msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\" failed" error="failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:01.343153 kubelet[1460]: E1213 02:01:01.343106 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:01:01.343153 kubelet[1460]: E1213 02:01:01.343155 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b"} Dec 13 02:01:01.343321 kubelet[1460]: E1213 02:01:01.343186 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:01.343321 kubelet[1460]: E1213 02:01:01.343208 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xz4sf" podUID="5159e81a-587d-4c37-a3bb-a79104fceca2" Dec 13 02:01:01.886279 kubelet[1460]: E1213 02:01:01.886234 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:02.887044 kubelet[1460]: E1213 02:01:02.886981 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:03.887413 kubelet[1460]: E1213 02:01:03.887369 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:04.888521 kubelet[1460]: E1213 02:01:04.888473 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:05.888725 kubelet[1460]: E1213 02:01:05.888685 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:06.889778 kubelet[1460]: E1213 02:01:06.889733 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:07.322999 kubelet[1460]: I1213 02:01:07.322898 1460 scope.go:117] "RemoveContainer" containerID="f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a" Dec 13 02:01:07.322999 kubelet[1460]: E1213 02:01:07.322959 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:07.325315 env[1210]: time="2024-12-13T02:01:07.325279376Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 02:01:07.337546 env[1210]: time="2024-12-13T02:01:07.337489690Z" level=info msg="CreateContainer within sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d\"" Dec 13 02:01:07.337881 env[1210]: time="2024-12-13T02:01:07.337846783Z" level=info msg="StartContainer for \"5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d\"" Dec 13 02:01:07.354379 systemd[1]: Started cri-containerd-5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d.scope. Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.366687 kernel: kauditd_printk_skb: 78 callbacks suppressed Dec 13 02:01:07.366739 kernel: audit: type=1400 audit(1734055267.364:538): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe95af817b8 items=0 ppid=1578 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:07.375396 kernel: audit: type=1300 audit(1734055267.364:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe95af817b8 items=0 ppid=1578 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:07.375439 kernel: audit: type=1327 audit(1734055267.364:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303064643964616134633137373432336539316532303265663937 Dec 13 02:01:07.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303064643964616134633137373432336539316532303265663937 Dec 13 02:01:07.380133 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.383335 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.390138 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.390177 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.395543 env[1210]: time="2024-12-13T02:01:07.395485322Z" level=info msg="StartContainer for \"5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d\" returns successfully" Dec 13 02:01:07.397271 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.397383 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.403440 kernel: audit: type=1400 audit(1734055267.364:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.364000 audit: BPF prog-id=84 op=LOAD Dec 13 02:01:07.364000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031c4c8 items=0 ppid=1578 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:07.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303064643964616134633137373432336539316532303265663937 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.368000 audit: BPF prog-id=85 op=LOAD Dec 13 02:01:07.368000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031c518 items=0 ppid=1578 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:07.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303064643964616134633137373432336539316532303265663937 Dec 13 02:01:07.373000 audit: BPF prog-id=85 op=UNLOAD Dec 13 02:01:07.373000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:07.373000 audit: BPF prog-id=86 op=LOAD Dec 13 02:01:07.373000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031c5a8 items=0 ppid=1578 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:07.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303064643964616134633137373432336539316532303265663937 Dec 13 02:01:07.409262 kubelet[1460]: E1213 02:01:07.409222 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:07.420374 kubelet[1460]: I1213 02:01:07.420324 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ktvt6" podStartSLOduration=24.364766534 podStartE2EDuration="49.420310223s" podCreationTimestamp="2024-12-13 02:00:18 +0000 UTC" firstStartedPulling="2024-12-13 02:00:20.823687019 +0000 UTC m=+3.351458489" lastFinishedPulling="2024-12-13 02:00:45.879230698 +0000 UTC m=+28.407002178" observedRunningTime="2024-12-13 02:00:46.517377809 +0000 UTC m=+29.045149289" watchObservedRunningTime="2024-12-13 02:01:07.420310223 +0000 UTC m=+49.948081703" Dec 13 02:01:07.448153 systemd[1]: cri-containerd-5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d.scope: Deactivated successfully. Dec 13 02:01:07.451000 audit: BPF prog-id=86 op=UNLOAD Dec 13 02:01:07.472291 env[1210]: time="2024-12-13T02:01:07.472247656Z" level=info msg="shim disconnected" id=5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d Dec 13 02:01:07.472291 env[1210]: time="2024-12-13T02:01:07.472287302Z" level=warning msg="cleaning up after shim disconnected" id=5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d namespace=k8s.io Dec 13 02:01:07.472291 env[1210]: time="2024-12-13T02:01:07.472296619Z" level=info msg="cleaning up dead shim" Dec 13 02:01:07.477734 env[1210]: time="2024-12-13T02:01:07.477701546Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2389 runtime=io.containerd.runc.v2\n" Dec 13 02:01:07.890652 kubelet[1460]: E1213 02:01:07.890600 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:08.333360 systemd[1]: run-containerd-runc-k8s.io-5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d-runc.c7X5NO.mount: Deactivated successfully. Dec 13 02:01:08.333449 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d-rootfs.mount: Deactivated successfully. Dec 13 02:01:08.411671 kubelet[1460]: I1213 02:01:08.411641 1460 scope.go:117] "RemoveContainer" containerID="f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a" Dec 13 02:01:08.412427 kubelet[1460]: I1213 02:01:08.411913 1460 scope.go:117] "RemoveContainer" containerID="5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d" Dec 13 02:01:08.412427 kubelet[1460]: E1213 02:01:08.411962 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:08.412427 kubelet[1460]: E1213 02:01:08.412299 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-ktvt6_calico-system(1b9c60dd-d412-40c5-8535-0c9da51953f7)\"" pod="calico-system/calico-node-ktvt6" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" Dec 13 02:01:08.412740 env[1210]: time="2024-12-13T02:01:08.412706210Z" level=info msg="RemoveContainer for \"f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a\"" Dec 13 02:01:08.415432 env[1210]: time="2024-12-13T02:01:08.415399855Z" level=info msg="RemoveContainer for \"f1cda9eca4f03da3183b0807a06fb446c2ea09182d12147762f28a7e8cf6086a\" returns successfully" Dec 13 02:01:08.890744 kubelet[1460]: E1213 02:01:08.890699 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:09.414967 kubelet[1460]: I1213 02:01:09.414925 1460 scope.go:117] "RemoveContainer" containerID="5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d" Dec 13 02:01:09.415130 kubelet[1460]: E1213 02:01:09.414989 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:09.415584 kubelet[1460]: E1213 02:01:09.415550 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-ktvt6_calico-system(1b9c60dd-d412-40c5-8535-0c9da51953f7)\"" pod="calico-system/calico-node-ktvt6" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" Dec 13 02:01:09.891468 kubelet[1460]: E1213 02:01:09.891412 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:10.891924 kubelet[1460]: E1213 02:01:10.891844 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:11.892308 kubelet[1460]: E1213 02:01:11.892219 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:12.892975 kubelet[1460]: E1213 02:01:12.892905 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:13.323013 env[1210]: time="2024-12-13T02:01:13.322896015Z" level=info msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\"" Dec 13 02:01:13.343584 env[1210]: time="2024-12-13T02:01:13.343506863Z" level=error msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\" failed" error="failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:13.343745 kubelet[1460]: E1213 02:01:13.343711 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:01:13.343807 kubelet[1460]: E1213 02:01:13.343752 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b"} Dec 13 02:01:13.343807 kubelet[1460]: E1213 02:01:13.343781 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:13.343807 kubelet[1460]: E1213 02:01:13.343800 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5159e81a-587d-4c37-a3bb-a79104fceca2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xz4sf" podUID="5159e81a-587d-4c37-a3bb-a79104fceca2" Dec 13 02:01:13.893228 kubelet[1460]: E1213 02:01:13.893177 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:14.324136 env[1210]: time="2024-12-13T02:01:14.323856572Z" level=info msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\"" Dec 13 02:01:14.345063 env[1210]: time="2024-12-13T02:01:14.344995685Z" level=error msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\" failed" error="failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:14.345261 kubelet[1460]: E1213 02:01:14.345219 1460 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:01:14.345327 kubelet[1460]: E1213 02:01:14.345273 1460 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247"} Dec 13 02:01:14.345327 kubelet[1460]: E1213 02:01:14.345308 1460 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:14.345458 kubelet[1460]: E1213 02:01:14.345329 1460 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd828415-db04-43cc-8ba4-01f937db2391\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r5cpj" podUID="fd828415-db04-43cc-8ba4-01f937db2391" Dec 13 02:01:14.556279 env[1210]: time="2024-12-13T02:01:14.556232340Z" level=info msg="StopPodSandbox for \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\"" Dec 13 02:01:14.556467 env[1210]: time="2024-12-13T02:01:14.556300298Z" level=info msg="Container to stop \"0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:01:14.556467 env[1210]: time="2024-12-13T02:01:14.556321338Z" level=info msg="Container to stop \"77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:01:14.556467 env[1210]: time="2024-12-13T02:01:14.556334683Z" level=info msg="Container to stop \"5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:01:14.558023 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7-shm.mount: Deactivated successfully. Dec 13 02:01:14.560000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:01:14.561544 systemd[1]: cri-containerd-caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7.scope: Deactivated successfully. Dec 13 02:01:14.562732 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:01:14.562796 kernel: audit: type=1334 audit(1734055274.560:545): prog-id=61 op=UNLOAD Dec 13 02:01:14.567000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:01:14.570562 kernel: audit: type=1334 audit(1734055274.567:546): prog-id=64 op=UNLOAD Dec 13 02:01:14.575570 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7-rootfs.mount: Deactivated successfully. Dec 13 02:01:14.582513 env[1210]: time="2024-12-13T02:01:14.582460791Z" level=info msg="shim disconnected" id=caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7 Dec 13 02:01:14.582656 env[1210]: time="2024-12-13T02:01:14.582512678Z" level=warning msg="cleaning up after shim disconnected" id=caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7 namespace=k8s.io Dec 13 02:01:14.582656 env[1210]: time="2024-12-13T02:01:14.582522336Z" level=info msg="cleaning up dead shim" Dec 13 02:01:14.588928 env[1210]: time="2024-12-13T02:01:14.588885759Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2467 runtime=io.containerd.runc.v2\n" Dec 13 02:01:14.589194 env[1210]: time="2024-12-13T02:01:14.589164644Z" level=info msg="TearDown network for sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" successfully" Dec 13 02:01:14.589194 env[1210]: time="2024-12-13T02:01:14.589187196Z" level=info msg="StopPodSandbox for \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" returns successfully" Dec 13 02:01:14.618841 kubelet[1460]: I1213 02:01:14.618803 1460 topology_manager.go:215] "Topology Admit Handler" podUID="fa873c5e-cb81-43fd-8f56-173cf3bc02a1" podNamespace="calico-system" podName="calico-node-p9xjd" Dec 13 02:01:14.618841 kubelet[1460]: E1213 02:01:14.618843 1460 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="flexvol-driver" Dec 13 02:01:14.619026 kubelet[1460]: E1213 02:01:14.618851 1460 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="install-cni" Dec 13 02:01:14.619026 kubelet[1460]: E1213 02:01:14.618855 1460 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="calico-node" Dec 13 02:01:14.619026 kubelet[1460]: E1213 02:01:14.618859 1460 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="calico-node" Dec 13 02:01:14.619026 kubelet[1460]: E1213 02:01:14.618864 1460 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="calico-node" Dec 13 02:01:14.619026 kubelet[1460]: I1213 02:01:14.618878 1460 memory_manager.go:354] "RemoveStaleState removing state" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="calico-node" Dec 13 02:01:14.619026 kubelet[1460]: I1213 02:01:14.618883 1460 memory_manager.go:354] "RemoveStaleState removing state" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="calico-node" Dec 13 02:01:14.619026 kubelet[1460]: I1213 02:01:14.618888 1460 memory_manager.go:354] "RemoveStaleState removing state" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" containerName="calico-node" Dec 13 02:01:14.622800 systemd[1]: Created slice kubepods-besteffort-podfa873c5e_cb81_43fd_8f56_173cf3bc02a1.slice. Dec 13 02:01:14.665016 kubelet[1460]: I1213 02:01:14.664978 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kvfj5\" (UniqueName: \"kubernetes.io/projected/1b9c60dd-d412-40c5-8535-0c9da51953f7-kube-api-access-kvfj5\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665158 kubelet[1460]: I1213 02:01:14.665028 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-policysync\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665158 kubelet[1460]: I1213 02:01:14.665044 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-lib-modules\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665158 kubelet[1460]: I1213 02:01:14.665063 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1b9c60dd-d412-40c5-8535-0c9da51953f7-tigera-ca-bundle\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665158 kubelet[1460]: I1213 02:01:14.665077 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-log-dir\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665158 kubelet[1460]: I1213 02:01:14.665091 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-bin-dir\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665158 kubelet[1460]: I1213 02:01:14.665107 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-flexvol-driver-host\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665311 kubelet[1460]: I1213 02:01:14.665120 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-lib-calico\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665311 kubelet[1460]: I1213 02:01:14.665132 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-xtables-lock\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665311 kubelet[1460]: I1213 02:01:14.665146 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-net-dir\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665311 kubelet[1460]: I1213 02:01:14.665158 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-run-calico\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665311 kubelet[1460]: I1213 02:01:14.665175 1460 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1b9c60dd-d412-40c5-8535-0c9da51953f7-node-certs\") pod \"1b9c60dd-d412-40c5-8535-0c9da51953f7\" (UID: \"1b9c60dd-d412-40c5-8535-0c9da51953f7\") " Dec 13 02:01:14.665311 kubelet[1460]: I1213 02:01:14.665202 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-lib-modules\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665457 kubelet[1460]: I1213 02:01:14.665217 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-node-certs\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665457 kubelet[1460]: I1213 02:01:14.665234 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zsbkw\" (UniqueName: \"kubernetes.io/projected/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-kube-api-access-zsbkw\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665457 kubelet[1460]: I1213 02:01:14.665246 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-policysync\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665457 kubelet[1460]: I1213 02:01:14.665261 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-cni-log-dir\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665457 kubelet[1460]: I1213 02:01:14.665274 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-cni-bin-dir\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665591 kubelet[1460]: I1213 02:01:14.665286 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-flexvol-driver-host\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665591 kubelet[1460]: I1213 02:01:14.665299 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-cni-net-dir\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665591 kubelet[1460]: I1213 02:01:14.665307 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665591 kubelet[1460]: I1213 02:01:14.665378 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665591 kubelet[1460]: I1213 02:01:14.665401 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665719 kubelet[1460]: I1213 02:01:14.665420 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665719 kubelet[1460]: I1213 02:01:14.665465 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665719 kubelet[1460]: I1213 02:01:14.665471 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-policysync" (OuterVolumeSpecName: "policysync") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665719 kubelet[1460]: I1213 02:01:14.665489 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665719 kubelet[1460]: I1213 02:01:14.665507 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665840 kubelet[1460]: I1213 02:01:14.665548 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.665840 kubelet[1460]: I1213 02:01:14.665315 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-xtables-lock\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665840 kubelet[1460]: I1213 02:01:14.665589 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-var-run-calico\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665840 kubelet[1460]: I1213 02:01:14.665633 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-tigera-ca-bundle\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665840 kubelet[1460]: I1213 02:01:14.665665 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fa873c5e-cb81-43fd-8f56-173cf3bc02a1-var-lib-calico\") pod \"calico-node-p9xjd\" (UID: \"fa873c5e-cb81-43fd-8f56-173cf3bc02a1\") " pod="calico-system/calico-node-p9xjd" Dec 13 02:01:14.665840 kubelet[1460]: I1213 02:01:14.665720 1460 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-flexvol-driver-host\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665737 1460 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-lib-calico\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665750 1460 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-log-dir\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665761 1460 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-lib-modules\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665771 1460 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-net-dir\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665802 1460 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-cni-bin-dir\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665813 1460 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-xtables-lock\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665823 1460 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-var-run-calico\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.665976 kubelet[1460]: I1213 02:01:14.665832 1460 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1b9c60dd-d412-40c5-8535-0c9da51953f7-policysync\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.667487 kubelet[1460]: I1213 02:01:14.667442 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1b9c60dd-d412-40c5-8535-0c9da51953f7-node-certs" (OuterVolumeSpecName: "node-certs") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:01:14.667719 kubelet[1460]: I1213 02:01:14.667689 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1b9c60dd-d412-40c5-8535-0c9da51953f7-kube-api-access-kvfj5" (OuterVolumeSpecName: "kube-api-access-kvfj5") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "kube-api-access-kvfj5". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:01:14.668897 kubelet[1460]: I1213 02:01:14.668865 1460 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1b9c60dd-d412-40c5-8535-0c9da51953f7-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "1b9c60dd-d412-40c5-8535-0c9da51953f7" (UID: "1b9c60dd-d412-40c5-8535-0c9da51953f7"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:01:14.669060 systemd[1]: var-lib-kubelet-pods-1b9c60dd\x2dd412\x2d40c5\x2d8535\x2d0c9da51953f7-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 02:01:14.669160 systemd[1]: var-lib-kubelet-pods-1b9c60dd\x2dd412\x2d40c5\x2d8535\x2d0c9da51953f7-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkvfj5.mount: Deactivated successfully. Dec 13 02:01:14.669217 systemd[1]: var-lib-kubelet-pods-1b9c60dd\x2dd412\x2d40c5\x2d8535\x2d0c9da51953f7-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 02:01:14.766308 kubelet[1460]: I1213 02:01:14.766251 1460 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1b9c60dd-d412-40c5-8535-0c9da51953f7-node-certs\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.766494 kubelet[1460]: I1213 02:01:14.766314 1460 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-kvfj5\" (UniqueName: \"kubernetes.io/projected/1b9c60dd-d412-40c5-8535-0c9da51953f7-kube-api-access-kvfj5\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.766494 kubelet[1460]: I1213 02:01:14.766346 1460 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1b9c60dd-d412-40c5-8535-0c9da51953f7-tigera-ca-bundle\") on node \"10.0.0.142\" DevicePath \"\"" Dec 13 02:01:14.893614 kubelet[1460]: E1213 02:01:14.893569 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:14.924976 kubelet[1460]: E1213 02:01:14.924945 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:14.925462 env[1210]: time="2024-12-13T02:01:14.925413793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p9xjd,Uid:fa873c5e-cb81-43fd-8f56-173cf3bc02a1,Namespace:calico-system,Attempt:0,}" Dec 13 02:01:14.937347 env[1210]: time="2024-12-13T02:01:14.937275591Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:14.937347 env[1210]: time="2024-12-13T02:01:14.937305147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:14.937347 env[1210]: time="2024-12-13T02:01:14.937314375Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:14.937569 env[1210]: time="2024-12-13T02:01:14.937410735Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49 pid=2492 runtime=io.containerd.runc.v2 Dec 13 02:01:14.947070 systemd[1]: Started cri-containerd-1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49.scope. Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.962038 kernel: audit: type=1400 audit(1734055274.953:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.962087 kernel: audit: type=1400 audit(1734055274.953:548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.962110 kernel: audit: type=1400 audit(1734055274.953:549): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.967955 kernel: audit: type=1400 audit(1734055274.953:550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.967984 kernel: audit: type=1400 audit(1734055274.953:551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.974188 kernel: audit: type=1400 audit(1734055274.953:552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.974226 kernel: audit: type=1400 audit(1734055274.953:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.980372 kernel: audit: type=1400 audit(1734055274.953:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.954000 audit: BPF prog-id=87 op=LOAD Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343962386231333664316663366135613834646539643161366164 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343962386231333664316663366135613834646539643161366164 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.956000 audit: BPF prog-id=88 op=LOAD Dec 13 02:01:14.956000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a6ad0 items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343962386231333664316663366135613834646539643161366164 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.957000 audit: BPF prog-id=89 op=LOAD Dec 13 02:01:14.957000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a6b18 items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343962386231333664316663366135613834646539643161366164 Dec 13 02:01:14.960000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:01:14.960000 audit: BPF prog-id=88 op=UNLOAD Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.960000 audit: BPF prog-id=90 op=LOAD Dec 13 02:01:14.960000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a6f28 items=0 ppid=2492 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343962386231333664316663366135613834646539643161366164 Dec 13 02:01:14.986258 env[1210]: time="2024-12-13T02:01:14.986207198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p9xjd,Uid:fa873c5e-cb81-43fd-8f56-173cf3bc02a1,Namespace:calico-system,Attempt:0,} returns sandbox id \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\"" Dec 13 02:01:14.986897 kubelet[1460]: E1213 02:01:14.986852 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:14.988414 env[1210]: time="2024-12-13T02:01:14.988390286Z" level=info msg="CreateContainer within sandbox \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:01:15.003367 env[1210]: time="2024-12-13T02:01:15.003321879Z" level=info msg="CreateContainer within sandbox \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79\"" Dec 13 02:01:15.003701 env[1210]: time="2024-12-13T02:01:15.003678821Z" level=info msg="StartContainer for \"8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79\"" Dec 13 02:01:15.016960 systemd[1]: Started cri-containerd-8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79.scope. Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2ad061d018 items=0 ppid=2492 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373963656664303639633238386135636366663136346338373732 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.027000 audit: BPF prog-id=91 op=LOAD Dec 13 02:01:15.027000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa6f8 items=0 ppid=2492 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373963656664303639633238386135636366663136346338373732 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit: BPF prog-id=92 op=LOAD Dec 13 02:01:15.028000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fa748 items=0 ppid=2492 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373963656664303639633238386135636366663136346338373732 Dec 13 02:01:15.028000 audit: BPF prog-id=92 op=UNLOAD Dec 13 02:01:15.028000 audit: BPF prog-id=91 op=UNLOAD Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.028000 audit: BPF prog-id=93 op=LOAD Dec 13 02:01:15.028000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fa7d8 items=0 ppid=2492 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373963656664303639633238386135636366663136346338373732 Dec 13 02:01:15.040724 env[1210]: time="2024-12-13T02:01:15.040681308Z" level=info msg="StartContainer for \"8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79\" returns successfully" Dec 13 02:01:15.050569 systemd[1]: cri-containerd-8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79.scope: Deactivated successfully. Dec 13 02:01:15.054000 audit: BPF prog-id=93 op=UNLOAD Dec 13 02:01:15.113161 env[1210]: time="2024-12-13T02:01:15.113101822Z" level=info msg="shim disconnected" id=8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79 Dec 13 02:01:15.113161 env[1210]: time="2024-12-13T02:01:15.113154060Z" level=warning msg="cleaning up after shim disconnected" id=8f79cefd069c288a5ccff164c8772ec347f6227eb315473d4f2c0174764b4d79 namespace=k8s.io Dec 13 02:01:15.113325 env[1210]: time="2024-12-13T02:01:15.113166944Z" level=info msg="cleaning up dead shim" Dec 13 02:01:15.119368 env[1210]: time="2024-12-13T02:01:15.119339987Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2569 runtime=io.containerd.runc.v2\n" Dec 13 02:01:15.423581 kubelet[1460]: I1213 02:01:15.423547 1460 scope.go:117] "RemoveContainer" containerID="5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d" Dec 13 02:01:15.424362 env[1210]: time="2024-12-13T02:01:15.424328849Z" level=info msg="RemoveContainer for \"5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d\"" Dec 13 02:01:15.425123 kubelet[1460]: E1213 02:01:15.425103 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:15.426875 systemd[1]: Removed slice kubepods-besteffort-pod1b9c60dd_d412_40c5_8535_0c9da51953f7.slice. Dec 13 02:01:15.427602 env[1210]: time="2024-12-13T02:01:15.427555479Z" level=info msg="CreateContainer within sandbox \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:01:15.428377 env[1210]: time="2024-12-13T02:01:15.428349172Z" level=info msg="RemoveContainer for \"5c00dd9daa4c177423e91e202ef97bcaf4385d1b461634bf034532d6978caf1d\" returns successfully" Dec 13 02:01:15.428644 kubelet[1460]: I1213 02:01:15.428590 1460 scope.go:117] "RemoveContainer" containerID="77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61" Dec 13 02:01:15.429742 env[1210]: time="2024-12-13T02:01:15.429692489Z" level=info msg="RemoveContainer for \"77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61\"" Dec 13 02:01:15.432158 env[1210]: time="2024-12-13T02:01:15.432128351Z" level=info msg="RemoveContainer for \"77e2185c3c426392e0b403068b14f50507505b01569940b5d76117a9c0160d61\" returns successfully" Dec 13 02:01:15.432297 kubelet[1460]: I1213 02:01:15.432269 1460 scope.go:117] "RemoveContainer" containerID="0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587" Dec 13 02:01:15.433079 env[1210]: time="2024-12-13T02:01:15.433057429Z" level=info msg="RemoveContainer for \"0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587\"" Dec 13 02:01:15.438023 env[1210]: time="2024-12-13T02:01:15.437977484Z" level=info msg="RemoveContainer for \"0cc537eec8a6b184b614c53047b0c26208f436dac457353e08c684f84f5ac587\" returns successfully" Dec 13 02:01:15.444724 env[1210]: time="2024-12-13T02:01:15.444671778Z" level=info msg="CreateContainer within sandbox \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be\"" Dec 13 02:01:15.445194 env[1210]: time="2024-12-13T02:01:15.445148234Z" level=info msg="StartContainer for \"7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be\"" Dec 13 02:01:15.460173 systemd[1]: Started cri-containerd-7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be.scope. Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1e6c134208 items=0 ppid=2492 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383461373165646235373034653562613431323432636230323564 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit: BPF prog-id=94 op=LOAD Dec 13 02:01:15.471000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e3ed8 items=0 ppid=2492 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383461373165646235373034653562613431323432636230323564 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit: BPF prog-id=95 op=LOAD Dec 13 02:01:15.471000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e3f28 items=0 ppid=2492 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383461373165646235373034653562613431323432636230323564 Dec 13 02:01:15.471000 audit: BPF prog-id=95 op=UNLOAD Dec 13 02:01:15.471000 audit: BPF prog-id=94 op=UNLOAD Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.471000 audit: BPF prog-id=96 op=LOAD Dec 13 02:01:15.471000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e3fb8 items=0 ppid=2492 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383461373165646235373034653562613431323432636230323564 Dec 13 02:01:15.484374 env[1210]: time="2024-12-13T02:01:15.484318469Z" level=info msg="StartContainer for \"7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be\" returns successfully" Dec 13 02:01:15.735265 systemd[1]: cri-containerd-7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be.scope: Deactivated successfully. Dec 13 02:01:15.739000 audit: BPF prog-id=96 op=UNLOAD Dec 13 02:01:15.750378 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be-rootfs.mount: Deactivated successfully. Dec 13 02:01:15.758224 env[1210]: time="2024-12-13T02:01:15.758185216Z" level=info msg="shim disconnected" id=7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be Dec 13 02:01:15.758322 env[1210]: time="2024-12-13T02:01:15.758230421Z" level=warning msg="cleaning up after shim disconnected" id=7a84a71edb5704e5ba41242cb025db36b984075eb6e372f17734c8bc387df8be namespace=k8s.io Dec 13 02:01:15.758322 env[1210]: time="2024-12-13T02:01:15.758238496Z" level=info msg="cleaning up dead shim" Dec 13 02:01:15.764970 env[1210]: time="2024-12-13T02:01:15.764948108Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2634 runtime=io.containerd.runc.v2\n" Dec 13 02:01:15.893959 kubelet[1460]: E1213 02:01:15.893919 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:16.325221 kubelet[1460]: I1213 02:01:16.325170 1460 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="1b9c60dd-d412-40c5-8535-0c9da51953f7" path="/var/lib/kubelet/pods/1b9c60dd-d412-40c5-8535-0c9da51953f7/volumes" Dec 13 02:01:16.428616 kubelet[1460]: E1213 02:01:16.428444 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:16.438012 env[1210]: time="2024-12-13T02:01:16.437969670Z" level=info msg="CreateContainer within sandbox \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:01:16.454348 env[1210]: time="2024-12-13T02:01:16.454306907Z" level=info msg="CreateContainer within sandbox \"1049b8b136d1fc6a5a84de9d1a6adcd51055effd10754a65dffc0d924ba9ce49\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1ce75664c7585ad0f4ed2b4f8206a006792d1d65e945127c9c6d1e5be51a5d15\"" Dec 13 02:01:16.454785 env[1210]: time="2024-12-13T02:01:16.454741093Z" level=info msg="StartContainer for \"1ce75664c7585ad0f4ed2b4f8206a006792d1d65e945127c9c6d1e5be51a5d15\"" Dec 13 02:01:16.468630 systemd[1]: Started cri-containerd-1ce75664c7585ad0f4ed2b4f8206a006792d1d65e945127c9c6d1e5be51a5d15.scope. Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe8dd3f34d8 items=0 ppid=2492 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653735363634633735383561643066346564326234663832303661 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit: BPF prog-id=97 op=LOAD Dec 13 02:01:16.478000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002343a8 items=0 ppid=2492 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653735363634633735383561643066346564326234663832303661 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.478000 audit: BPF prog-id=98 op=LOAD Dec 13 02:01:16.478000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002343f8 items=0 ppid=2492 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653735363634633735383561643066346564326234663832303661 Dec 13 02:01:16.479000 audit: BPF prog-id=98 op=UNLOAD Dec 13 02:01:16.479000 audit: BPF prog-id=97 op=UNLOAD Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.479000 audit: BPF prog-id=99 op=LOAD Dec 13 02:01:16.479000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000234488 items=0 ppid=2492 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653735363634633735383561643066346564326234663832303661 Dec 13 02:01:16.495073 env[1210]: time="2024-12-13T02:01:16.495028967Z" level=info msg="StartContainer for \"1ce75664c7585ad0f4ed2b4f8206a006792d1d65e945127c9c6d1e5be51a5d15\" returns successfully" Dec 13 02:01:16.558643 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2948894201.mount: Deactivated successfully. Dec 13 02:01:16.894252 kubelet[1460]: E1213 02:01:16.894208 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:17.433350 kubelet[1460]: E1213 02:01:17.433314 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:17.703000 audit[2782]: AVC avc: denied { write } for pid=2782 comm="tee" name="fd" dev="proc" ino=20303 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.704000 audit[2787]: AVC avc: denied { write } for pid=2787 comm="tee" name="fd" dev="proc" ino=20916 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.704000 audit[2787]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1f1a2a29 a2=241 a3=1b6 items=1 ppid=2747 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.704000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:01:17.704000 audit: PATH item=0 name="/dev/fd/63" inode=20913 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.704000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.703000 audit[2782]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd63b18a29 a2=241 a3=1b6 items=1 ppid=2742 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.703000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:01:17.703000 audit: PATH item=0 name="/dev/fd/63" inode=21789 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.708000 audit[2777]: AVC avc: denied { write } for pid=2777 comm="tee" name="fd" dev="proc" ino=20313 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.712000 audit[2806]: AVC avc: denied { write } for pid=2806 comm="tee" name="fd" dev="proc" ino=21800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.712000 audit[2806]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb50f7a29 a2=241 a3=1b6 items=1 ppid=2750 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.712000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:01:17.712000 audit: PATH item=0 name="/dev/fd/63" inode=21796 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.712000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.715000 audit[2810]: AVC avc: denied { write } for pid=2810 comm="tee" name="fd" dev="proc" ino=21804 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.715000 audit[2810]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffeb28aa1a a2=241 a3=1b6 items=1 ppid=2746 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.715000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:01:17.715000 audit: PATH item=0 name="/dev/fd/63" inode=21797 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.715000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.717000 audit[2803]: AVC avc: denied { write } for pid=2803 comm="tee" name="fd" dev="proc" ino=20920 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.717000 audit[2803]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed9742a19 a2=241 a3=1b6 items=1 ppid=2744 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.717000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:01:17.717000 audit: PATH item=0 name="/dev/fd/63" inode=21795 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.717000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.708000 audit[2777]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff664b0a2a a2=241 a3=1b6 items=1 ppid=2740 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.708000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:01:17.708000 audit: PATH item=0 name="/dev/fd/63" inode=20906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.708000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.732000 audit[2823]: AVC avc: denied { write } for pid=2823 comm="tee" name="fd" dev="proc" ino=20321 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.732000 audit[2823]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe909efa2b a2=241 a3=1b6 items=1 ppid=2752 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.732000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:01:17.732000 audit: PATH item=0 name="/dev/fd/63" inode=20318 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.792000 audit: BPF prog-id=100 op=LOAD Dec 13 02:01:17.792000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec3344840 a2=98 a3=3 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.792000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.793000 audit: BPF prog-id=100 op=UNLOAD Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit: BPF prog-id=101 op=LOAD Dec 13 02:01:17.793000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec3344620 a2=74 a3=540051 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.793000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.793000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.793000 audit: BPF prog-id=102 op=LOAD Dec 13 02:01:17.793000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec3344650 a2=94 a3=2 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.793000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.793000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:01:17.864891 kubelet[1460]: E1213 02:01:17.864847 1460 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:17.876117 env[1210]: time="2024-12-13T02:01:17.876074663Z" level=info msg="StopPodSandbox for \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\"" Dec 13 02:01:17.876363 env[1210]: time="2024-12-13T02:01:17.876147280Z" level=info msg="TearDown network for sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" successfully" Dec 13 02:01:17.876363 env[1210]: time="2024-12-13T02:01:17.876178949Z" level=info msg="StopPodSandbox for \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" returns successfully" Dec 13 02:01:17.876557 env[1210]: time="2024-12-13T02:01:17.876523006Z" level=info msg="RemovePodSandbox for \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\"" Dec 13 02:01:17.876618 env[1210]: time="2024-12-13T02:01:17.876557611Z" level=info msg="Forcibly stopping sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\"" Dec 13 02:01:17.876618 env[1210]: time="2024-12-13T02:01:17.876610921Z" level=info msg="TearDown network for sandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" successfully" Dec 13 02:01:17.884955 env[1210]: time="2024-12-13T02:01:17.884902664Z" level=info msg="RemovePodSandbox \"caa1646c702631ea7542ad702ec1ac9772c2caa0f9eed84389aa15bd7e7b8ab7\" returns successfully" Dec 13 02:01:17.894593 kubelet[1460]: E1213 02:01:17.894564 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit: BPF prog-id=103 op=LOAD Dec 13 02:01:17.894000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec3344510 a2=40 a3=1 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.894000 audit: BPF prog-id=103 op=UNLOAD Dec 13 02:01:17.894000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.894000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec33445e0 a2=50 a3=7ffec33446c0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec3344520 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec3344550 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec3344460 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec3344570 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec3344550 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec3344540 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec3344570 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec3344550 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec3344570 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec3344540 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.901000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.901000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec33445b0 a2=28 a3=0 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec3344360 a2=50 a3=1 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit: BPF prog-id=104 op=LOAD Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec3344360 a2=94 a3=5 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec3344410 a2=50 a3=1 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec3344530 a2=4 a3=38 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec3344580 a2=94 a3=6 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec3343d30 a2=94 a3=83 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.902000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:17.902000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec3343d30 a2=94 a3=83 items=0 ppid=2754 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit: BPF prog-id=105 op=LOAD Dec 13 02:01:17.908000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc888cd7e0 a2=98 a3=1999999999999999 items=0 ppid=2754 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:01:17.908000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit: BPF prog-id=106 op=LOAD Dec 13 02:01:17.908000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc888cd6c0 a2=74 a3=ffff items=0 ppid=2754 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:01:17.908000 audit: BPF prog-id=106 op=UNLOAD Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.908000 audit: BPF prog-id=107 op=LOAD Dec 13 02:01:17.908000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc888cd700 a2=40 a3=7ffc888cd8e0 items=0 ppid=2754 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:01:17.908000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:01:17.946923 systemd-networkd[1040]: vxlan.calico: Link UP Dec 13 02:01:17.946930 systemd-networkd[1040]: vxlan.calico: Gained carrier Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit: BPF prog-id=108 op=LOAD Dec 13 02:01:17.964000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9e9e8020 a2=98 a3=ffffffff items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.964000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit: BPF prog-id=109 op=LOAD Dec 13 02:01:17.964000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9e9e7e30 a2=74 a3=540051 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.964000 audit: BPF prog-id=109 op=UNLOAD Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.964000 audit: BPF prog-id=110 op=LOAD Dec 13 02:01:17.964000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9e9e7e60 a2=94 a3=2 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit: BPF prog-id=110 op=UNLOAD Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9e9e7d30 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e9e7d60 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e9e7c70 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9e9e7d80 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9e9e7d60 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9e9e7d50 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9e9e7d80 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e9e7d60 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e9e7d80 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e9e7d50 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9e9e7dc0 a2=28 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit: BPF prog-id=111 op=LOAD Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9e9e7c30 a2=40 a3=0 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.965000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:01:17.965000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.965000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff9e9e7c20 a2=50 a3=2800 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff9e9e7c20 a2=50 a3=2800 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit: BPF prog-id=112 op=LOAD Dec 13 02:01:17.968000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9e9e7440 a2=94 a3=2 items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.968000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.968000 audit: BPF prog-id=113 op=LOAD Dec 13 02:01:17.968000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9e9e7540 a2=94 a3=2d items=0 ppid=2754 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.973000 audit: BPF prog-id=114 op=LOAD Dec 13 02:01:17.973000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea6e2aca0 a2=98 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:17.973000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit: BPF prog-id=115 op=LOAD Dec 13 02:01:17.974000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea6e2aa80 a2=74 a3=540051 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:17.974000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.974000 audit: BPF prog-id=116 op=LOAD Dec 13 02:01:17.974000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea6e2aab0 a2=94 a3=2 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:17.974000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit: BPF prog-id=117 op=LOAD Dec 13 02:01:18.074000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea6e2a970 a2=40 a3=1 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.074000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.074000 audit: BPF prog-id=117 op=UNLOAD Dec 13 02:01:18.074000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.074000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffea6e2aa40 a2=50 a3=7ffea6e2ab20 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.074000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6e2a980 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6e2a9b0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6e2a8c0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6e2a9d0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6e2a9b0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6e2a9a0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6e2a9d0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6e2a9b0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6e2a9d0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea6e2a9a0 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea6e2aa10 a2=28 a3=0 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea6e2a7c0 a2=50 a3=1 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit: BPF prog-id=118 op=LOAD Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea6e2a7c0 a2=94 a3=5 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea6e2a870 a2=50 a3=1 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffea6e2a990 a2=4 a3=38 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { confidentiality } for pid=2896 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea6e2a9e0 a2=94 a3=6 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { confidentiality } for pid=2896 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea6e2a190 a2=94 a3=83 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.081000 audit[2896]: AVC avc: denied { confidentiality } for pid=2896 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:18.081000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea6e2a190 a2=94 a3=83 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.082000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.082000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea6e2bbd0 a2=10 a3=208 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.082000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.082000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea6e2ba70 a2=10 a3=3 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.082000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.082000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea6e2ba10 a2=10 a3=3 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.082000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.082000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea6e2ba10 a2=10 a3=7 items=0 ppid=2754 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.090000 audit: BPF prog-id=113 op=UNLOAD Dec 13 02:01:18.123000 audit[2928]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.123000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc23069270 a2=0 a3=7ffc2306925c items=0 ppid=2754 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.123000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.126000 audit[2924]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.126000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc6681eb10 a2=0 a3=7ffc6681eafc items=0 ppid=2754 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.126000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.129000 audit[2925]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.129000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe52cda3e0 a2=0 a3=7ffe52cda3cc items=0 ppid=2754 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.129000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.130000 audit[2923]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.130000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffca5022a10 a2=0 a3=7ffca50229fc items=0 ppid=2754 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.130000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.434425 kubelet[1460]: E1213 02:01:18.434398 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:18.895522 kubelet[1460]: E1213 02:01:18.895480 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:19.174687 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL Dec 13 02:01:19.896430 kubelet[1460]: E1213 02:01:19.896377 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:20.897214 kubelet[1460]: E1213 02:01:20.897159 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:21.424000 audit[2960]: NETFILTER_CFG table=filter:71 family=2 entries=16 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.426802 kernel: kauditd_printk_skb: 695 callbacks suppressed Dec 13 02:01:21.426860 kernel: audit: type=1325 audit(1734055281.424:687): table=filter:71 family=2 entries=16 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.424000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd2958ca40 a2=0 a3=7ffd2958ca2c items=0 ppid=1740 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.433607 kernel: audit: type=1300 audit(1734055281.424:687): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd2958ca40 a2=0 a3=7ffd2958ca2c items=0 ppid=1740 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.433661 kernel: audit: type=1327 audit(1734055281.424:687): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.439000 audit[2960]: NETFILTER_CFG table=nat:72 family=2 entries=14 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.439000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd2958ca40 a2=0 a3=0 items=0 ppid=1740 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.447846 kernel: audit: type=1325 audit(1734055281.439:688): table=nat:72 family=2 entries=14 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.447940 kernel: audit: type=1300 audit(1734055281.439:688): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd2958ca40 a2=0 a3=0 items=0 ppid=1740 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.447960 kernel: audit: type=1327 audit(1734055281.439:688): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.459000 audit[2962]: NETFILTER_CFG table=filter:73 family=2 entries=15 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.463544 kernel: audit: type=1325 audit(1734055281.459:689): table=filter:73 family=2 entries=15 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.463581 kernel: audit: type=1300 audit(1734055281.459:689): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff480cc100 a2=0 a3=7fff480cc0ec items=0 ppid=1740 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.459000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff480cc100 a2=0 a3=7fff480cc0ec items=0 ppid=1740 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.471853 kernel: audit: type=1327 audit(1734055281.459:689): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.474000 audit[2962]: NETFILTER_CFG table=nat:74 family=2 entries=21 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.474000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7fff480cc100 a2=0 a3=7fff480cc0ec items=0 ppid=1740 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.478557 kernel: audit: type=1325 audit(1734055281.474:690): table=nat:74 family=2 entries=21 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.897839 kubelet[1460]: E1213 02:01:21.897795 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:22.898324 kubelet[1460]: E1213 02:01:22.898280 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:23.899407 kubelet[1460]: E1213 02:01:23.899352 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:24.899618 kubelet[1460]: E1213 02:01:24.899591 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:25.900029 kubelet[1460]: E1213 02:01:25.900000 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:26.900599 kubelet[1460]: E1213 02:01:26.900540 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:27.324092 env[1210]: time="2024-12-13T02:01:27.323974570Z" level=info msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\"" Dec 13 02:01:27.359212 kubelet[1460]: I1213 02:01:27.359145 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-p9xjd" podStartSLOduration=13.359126713 podStartE2EDuration="13.359126713s" podCreationTimestamp="2024-12-13 02:01:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:17.451651496 +0000 UTC m=+59.979422976" watchObservedRunningTime="2024-12-13 02:01:27.359126713 +0000 UTC m=+69.886898193" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.358 [INFO][2989] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.359 [INFO][2989] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" iface="eth0" netns="/var/run/netns/cni-85fcd9fb-35d0-8e4a-3f6f-578bff54623d" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.359 [INFO][2989] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" iface="eth0" netns="/var/run/netns/cni-85fcd9fb-35d0-8e4a-3f6f-578bff54623d" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.359 [INFO][2989] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" iface="eth0" netns="/var/run/netns/cni-85fcd9fb-35d0-8e4a-3f6f-578bff54623d" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.359 [INFO][2989] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.359 [INFO][2989] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.378 [INFO][2997] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" HandleID="k8s-pod-network.1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.378 [INFO][2997] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.379 [INFO][2997] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.389 [WARNING][2997] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" HandleID="k8s-pod-network.1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.389 [INFO][2997] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" HandleID="k8s-pod-network.1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.390 [INFO][2997] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:27.393698 env[1210]: 2024-12-13 02:01:27.391 [INFO][2989] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b" Dec 13 02:01:27.394111 env[1210]: time="2024-12-13T02:01:27.393892441Z" level=info msg="TearDown network for sandbox \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\" successfully" Dec 13 02:01:27.394111 env[1210]: time="2024-12-13T02:01:27.393923419Z" level=info msg="StopPodSandbox for \"1320023cc66cbe31db30fe07004ea11549d9197571a1aa2faab541c2abeca88b\" returns successfully" Dec 13 02:01:27.395335 systemd[1]: run-netns-cni\x2d85fcd9fb\x2d35d0\x2d8e4a\x2d3f6f\x2d578bff54623d.mount: Deactivated successfully. Dec 13 02:01:27.395727 env[1210]: time="2024-12-13T02:01:27.395449896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xz4sf,Uid:5159e81a-587d-4c37-a3bb-a79104fceca2,Namespace:default,Attempt:1,}" Dec 13 02:01:27.438000 audit[3018]: NETFILTER_CFG table=filter:75 family=2 entries=14 op=nft_register_rule pid=3018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.441106 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:01:27.441225 kernel: audit: type=1325 audit(1734055287.438:691): table=filter:75 family=2 entries=14 op=nft_register_rule pid=3018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.438000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe34d51af0 a2=0 a3=7ffe34d51adc items=0 ppid=1740 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.447922 kernel: audit: type=1300 audit(1734055287.438:691): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe34d51af0 a2=0 a3=7ffe34d51adc items=0 ppid=1740 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.447958 kernel: audit: type=1327 audit(1734055287.438:691): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.455000 audit[3018]: NETFILTER_CFG table=nat:76 family=2 entries=24 op=nft_register_rule pid=3018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.455000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffe34d51af0 a2=0 a3=7ffe34d51adc items=0 ppid=1740 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.464075 kernel: audit: type=1325 audit(1734055287.455:692): table=nat:76 family=2 entries=24 op=nft_register_rule pid=3018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.464115 kernel: audit: type=1300 audit(1734055287.455:692): arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffe34d51af0 a2=0 a3=7ffe34d51adc items=0 ppid=1740 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.464133 kernel: audit: type=1327 audit(1734055287.455:692): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.499000 audit[3027]: NETFILTER_CFG table=filter:77 family=2 entries=14 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.499000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe81d22d60 a2=0 a3=7ffe81d22d4c items=0 ppid=1740 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.507778 kernel: audit: type=1325 audit(1734055287.499:693): table=filter:77 family=2 entries=14 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.507881 kernel: audit: type=1300 audit(1734055287.499:693): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe81d22d60 a2=0 a3=7ffe81d22d4c items=0 ppid=1740 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.507916 kernel: audit: type=1327 audit(1734055287.499:693): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.516000 audit[3027]: NETFILTER_CFG table=nat:78 family=2 entries=28 op=nft_register_chain pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.516000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=8932 a0=3 a1=7ffe81d22d60 a2=0 a3=7ffe81d22d4c items=0 ppid=1740 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.521547 kernel: audit: type=1325 audit(1734055287.516:694): table=nat:78 family=2 entries=28 op=nft_register_chain pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.544325 systemd-networkd[1040]: calie9dbbb4fb30: Link UP Dec 13 02:01:27.546321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:27.546383 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie9dbbb4fb30: link becomes ready Dec 13 02:01:27.546520 systemd-networkd[1040]: calie9dbbb4fb30: Gained carrier Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.480 [INFO][3004] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0 nginx-deployment-85f456d6dd- default 5159e81a-587d-4c37-a3bb-a79104fceca2 1209 0 2024-12-13 02:00:34 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.142 nginx-deployment-85f456d6dd-xz4sf eth0 default [] [] [kns.default ksa.default.default] calie9dbbb4fb30 [] []}} ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.480 [INFO][3004] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.509 [INFO][3020] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" HandleID="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.517 [INFO][3020] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" HandleID="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00060a6e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"nginx-deployment-85f456d6dd-xz4sf", "timestamp":"2024-12-13 02:01:27.509579307 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.517 [INFO][3020] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.517 [INFO][3020] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.517 [INFO][3020] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.519 [INFO][3020] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.522 [INFO][3020] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.526 [INFO][3020] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.528 [INFO][3020] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.530 [INFO][3020] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.530 [INFO][3020] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.531 [INFO][3020] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2 Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.536 [INFO][3020] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.540 [INFO][3020] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.129/26] block=192.168.25.128/26 handle="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.540 [INFO][3020] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.129/26] handle="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" host="10.0.0.142" Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.540 [INFO][3020] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:27.553472 env[1210]: 2024-12-13 02:01:27.540 [INFO][3020] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.129/26] IPv6=[] ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" HandleID="k8s-pod-network.91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.554175 env[1210]: 2024-12-13 02:01:27.541 [INFO][3004] cni-plugin/k8s.go 386: Populated endpoint ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"5159e81a-587d-4c37-a3bb-a79104fceca2", ResourceVersion:"1209", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-xz4sf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie9dbbb4fb30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:27.554175 env[1210]: 2024-12-13 02:01:27.542 [INFO][3004] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.129/32] ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.554175 env[1210]: 2024-12-13 02:01:27.542 [INFO][3004] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie9dbbb4fb30 ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.554175 env[1210]: 2024-12-13 02:01:27.546 [INFO][3004] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.554175 env[1210]: 2024-12-13 02:01:27.546 [INFO][3004] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"5159e81a-587d-4c37-a3bb-a79104fceca2", ResourceVersion:"1209", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2", Pod:"nginx-deployment-85f456d6dd-xz4sf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie9dbbb4fb30", MAC:"de:0a:d4:8a:29:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:27.554175 env[1210]: 2024-12-13 02:01:27.552 [INFO][3004] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2" Namespace="default" Pod="nginx-deployment-85f456d6dd-xz4sf" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--xz4sf-eth0" Dec 13 02:01:27.559000 audit[3045]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_chain pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:27.559000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffc744d0aa0 a2=0 a3=7ffc744d0a8c items=0 ppid=2754 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.559000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:27.565654 env[1210]: time="2024-12-13T02:01:27.565583495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:27.565879 env[1210]: time="2024-12-13T02:01:27.565634872Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:27.565879 env[1210]: time="2024-12-13T02:01:27.565648197Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:27.565981 env[1210]: time="2024-12-13T02:01:27.565849133Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2 pid=3053 runtime=io.containerd.runc.v2 Dec 13 02:01:27.580558 systemd[1]: Started cri-containerd-91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2.scope. Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.588000 audit: BPF prog-id=119 op=LOAD Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3053 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931643938396531646635363539336462626632666435303666656662 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3053 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931643938396531646635363539336462626632666435303666656662 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit: BPF prog-id=120 op=LOAD Dec 13 02:01:27.589000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000323a50 items=0 ppid=3053 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931643938396531646635363539336462626632666435303666656662 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit: BPF prog-id=121 op=LOAD Dec 13 02:01:27.589000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000323a98 items=0 ppid=3053 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931643938396531646635363539336462626632666435303666656662 Dec 13 02:01:27.589000 audit: BPF prog-id=121 op=UNLOAD Dec 13 02:01:27.589000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:27.589000 audit: BPF prog-id=122 op=LOAD Dec 13 02:01:27.589000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000323ea8 items=0 ppid=3053 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931643938396531646635363539336462626632666435303666656662 Dec 13 02:01:27.591393 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:27.614847 env[1210]: time="2024-12-13T02:01:27.614792059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xz4sf,Uid:5159e81a-587d-4c37-a3bb-a79104fceca2,Namespace:default,Attempt:1,} returns sandbox id \"91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2\"" Dec 13 02:01:27.616344 env[1210]: time="2024-12-13T02:01:27.616251110Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:01:27.901097 kubelet[1460]: E1213 02:01:27.901067 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:28.902098 kubelet[1460]: E1213 02:01:28.902044 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:29.323755 env[1210]: time="2024-12-13T02:01:29.323505050Z" level=info msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\"" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.363 [INFO][3109] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.363 [INFO][3109] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" iface="eth0" netns="/var/run/netns/cni-2fae9820-3294-8f18-5839-d62bf88b02d8" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.363 [INFO][3109] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" iface="eth0" netns="/var/run/netns/cni-2fae9820-3294-8f18-5839-d62bf88b02d8" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.364 [INFO][3109] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" iface="eth0" netns="/var/run/netns/cni-2fae9820-3294-8f18-5839-d62bf88b02d8" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.364 [INFO][3109] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.364 [INFO][3109] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.379 [INFO][3116] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" HandleID="k8s-pod-network.4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Workload="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.380 [INFO][3116] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.380 [INFO][3116] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.386 [WARNING][3116] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" HandleID="k8s-pod-network.4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Workload="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.386 [INFO][3116] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" HandleID="k8s-pod-network.4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Workload="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.387 [INFO][3116] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:29.389695 env[1210]: 2024-12-13 02:01:29.388 [INFO][3109] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247" Dec 13 02:01:29.390334 env[1210]: time="2024-12-13T02:01:29.390281851Z" level=info msg="TearDown network for sandbox \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\" successfully" Dec 13 02:01:29.390422 env[1210]: time="2024-12-13T02:01:29.390397098Z" level=info msg="StopPodSandbox for \"4d986eee8be929ad6771ec7ec8e4b7bd28253054183abca45c4371eaeef40247\" returns successfully" Dec 13 02:01:29.391869 systemd[1]: run-netns-cni\x2d2fae9820\x2d3294\x2d8f18\x2d5839\x2dd62bf88b02d8.mount: Deactivated successfully. Dec 13 02:01:29.392225 env[1210]: time="2024-12-13T02:01:29.392187059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r5cpj,Uid:fd828415-db04-43cc-8ba4-01f937db2391,Namespace:calico-system,Attempt:1,}" Dec 13 02:01:29.414846 systemd-networkd[1040]: calie9dbbb4fb30: Gained IPv6LL Dec 13 02:01:29.455000 audit[3147]: NETFILTER_CFG table=filter:80 family=2 entries=14 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.455000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff394f3aa0 a2=0 a3=7fff394f3a8c items=0 ppid=1740 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.462000 audit[3147]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.462000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7fff394f3aa0 a2=0 a3=0 items=0 ppid=1740 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.475000 audit[3150]: NETFILTER_CFG table=filter:82 family=2 entries=11 op=nft_register_rule pid=3150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.475000 audit[3150]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd13ecf530 a2=0 a3=7ffd13ecf51c items=0 ppid=1740 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.489000 audit[3150]: NETFILTER_CFG table=nat:83 family=2 entries=37 op=nft_register_chain pid=3150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.489000 audit[3150]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffd13ecf530 a2=0 a3=7ffd13ecf51c items=0 ppid=1740 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.507337 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:29.507483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calide692816048: link becomes ready Dec 13 02:01:29.510072 systemd-networkd[1040]: calide692816048: Link UP Dec 13 02:01:29.510943 systemd-networkd[1040]: calide692816048: Gained carrier Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.433 [INFO][3125] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-csi--node--driver--r5cpj-eth0 csi-node-driver- calico-system fd828415-db04-43cc-8ba4-01f937db2391 1250 0 2024-12-13 02:00:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.142 csi-node-driver-r5cpj eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calide692816048 [] []}} ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.433 [INFO][3125] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.462 [INFO][3140] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" HandleID="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Workload="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.475 [INFO][3140] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" HandleID="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Workload="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e9d00), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.142", "pod":"csi-node-driver-r5cpj", "timestamp":"2024-12-13 02:01:29.462816415 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.475 [INFO][3140] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.475 [INFO][3140] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.476 [INFO][3140] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.478 [INFO][3140] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.482 [INFO][3140] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.485 [INFO][3140] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.487 [INFO][3140] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.489 [INFO][3140] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.489 [INFO][3140] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.491 [INFO][3140] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044 Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.496 [INFO][3140] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.501 [INFO][3140] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.130/26] block=192.168.25.128/26 handle="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.501 [INFO][3140] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.130/26] handle="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" host="10.0.0.142" Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.501 [INFO][3140] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:29.521272 env[1210]: 2024-12-13 02:01:29.501 [INFO][3140] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.130/26] IPv6=[] ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" HandleID="k8s-pod-network.f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Workload="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.522385 env[1210]: 2024-12-13 02:01:29.503 [INFO][3125] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--r5cpj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fd828415-db04-43cc-8ba4-01f937db2391", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"csi-node-driver-r5cpj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calide692816048", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:29.522385 env[1210]: 2024-12-13 02:01:29.503 [INFO][3125] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.130/32] ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.522385 env[1210]: 2024-12-13 02:01:29.503 [INFO][3125] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calide692816048 ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.522385 env[1210]: 2024-12-13 02:01:29.507 [INFO][3125] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.522385 env[1210]: 2024-12-13 02:01:29.507 [INFO][3125] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--r5cpj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fd828415-db04-43cc-8ba4-01f937db2391", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044", Pod:"csi-node-driver-r5cpj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calide692816048", MAC:"96:74:5f:b4:7e:f0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:29.522385 env[1210]: 2024-12-13 02:01:29.518 [INFO][3125] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044" Namespace="calico-system" Pod="csi-node-driver-r5cpj" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--r5cpj-eth0" Dec 13 02:01:29.523000 audit[3161]: NETFILTER_CFG table=filter:84 family=2 entries=38 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:29.523000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff751ce600 a2=0 a3=7fff751ce5ec items=0 ppid=2754 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.523000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:29.708479 env[1210]: time="2024-12-13T02:01:29.708207530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:29.708479 env[1210]: time="2024-12-13T02:01:29.708256792Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:29.708479 env[1210]: time="2024-12-13T02:01:29.708269396Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:29.708479 env[1210]: time="2024-12-13T02:01:29.708414428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044 pid=3173 runtime=io.containerd.runc.v2 Dec 13 02:01:29.721753 systemd[1]: Started cri-containerd-f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044.scope. Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit: BPF prog-id=123 op=LOAD Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637353631346231303035303938343333653330356238366539623030 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637353631346231303035303938343333653330356238366539623030 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.732000 audit: BPF prog-id=124 op=LOAD Dec 13 02:01:29.732000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000290e80 items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637353631346231303035303938343333653330356238366539623030 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit: BPF prog-id=125 op=LOAD Dec 13 02:01:29.733000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000290ec8 items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637353631346231303035303938343333653330356238366539623030 Dec 13 02:01:29.733000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:01:29.733000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.733000 audit: BPF prog-id=126 op=LOAD Dec 13 02:01:29.733000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002912d8 items=0 ppid=3173 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637353631346231303035303938343333653330356238366539623030 Dec 13 02:01:29.735426 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:29.747564 env[1210]: time="2024-12-13T02:01:29.747509596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r5cpj,Uid:fd828415-db04-43cc-8ba4-01f937db2391,Namespace:calico-system,Attempt:1,} returns sandbox id \"f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044\"" Dec 13 02:01:29.902983 kubelet[1460]: E1213 02:01:29.902944 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:30.149185 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3039394420.mount: Deactivated successfully. Dec 13 02:01:30.452000 audit[3207]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=3207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:30.452000 audit[3207]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9adf3420 a2=0 a3=7fff9adf340c items=0 ppid=1740 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:30.458000 audit[3207]: NETFILTER_CFG table=nat:86 family=2 entries=58 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:30.458000 audit[3207]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7fff9adf3420 a2=0 a3=7fff9adf340c items=0 ppid=1740 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:30.903814 kubelet[1460]: E1213 02:01:30.903767 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:31.206736 systemd-networkd[1040]: calide692816048: Gained IPv6LL Dec 13 02:01:31.719786 env[1210]: time="2024-12-13T02:01:31.719737792Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.721757 env[1210]: time="2024-12-13T02:01:31.721717860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.723283 env[1210]: time="2024-12-13T02:01:31.723252913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.724756 env[1210]: time="2024-12-13T02:01:31.724707404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.725364 env[1210]: time="2024-12-13T02:01:31.725330033Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:01:31.726735 env[1210]: time="2024-12-13T02:01:31.726701418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:01:31.727384 env[1210]: time="2024-12-13T02:01:31.727355055Z" level=info msg="CreateContainer within sandbox \"91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 02:01:31.738615 env[1210]: time="2024-12-13T02:01:31.738580032Z" level=info msg="CreateContainer within sandbox \"91d989e1df56593dbbf2fd506fefbeaf12b4812b4868edbafe9b3bdf5abc27b2\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3fd66ec630f7c2ceff73edfe09314fb5c076914979dcf3bff4bd90281babac47\"" Dec 13 02:01:31.739018 env[1210]: time="2024-12-13T02:01:31.738970033Z" level=info msg="StartContainer for \"3fd66ec630f7c2ceff73edfe09314fb5c076914979dcf3bff4bd90281babac47\"" Dec 13 02:01:31.758063 systemd[1]: Started cri-containerd-3fd66ec630f7c2ceff73edfe09314fb5c076914979dcf3bff4bd90281babac47.scope. Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit: BPF prog-id=127 op=LOAD Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3053 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366643636656336333066376332636566663733656466653039333134 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3053 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366643636656336333066376332636566663733656466653039333134 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit: BPF prog-id=128 op=LOAD Dec 13 02:01:31.767000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001afa30 items=0 ppid=3053 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366643636656336333066376332636566663733656466653039333134 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit: BPF prog-id=129 op=LOAD Dec 13 02:01:31.767000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001afa78 items=0 ppid=3053 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366643636656336333066376332636566663733656466653039333134 Dec 13 02:01:31.767000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:01:31.767000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.767000 audit: BPF prog-id=130 op=LOAD Dec 13 02:01:31.767000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001afe88 items=0 ppid=3053 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366643636656336333066376332636566663733656466653039333134 Dec 13 02:01:31.899406 env[1210]: time="2024-12-13T02:01:31.899356263Z" level=info msg="StartContainer for \"3fd66ec630f7c2ceff73edfe09314fb5c076914979dcf3bff4bd90281babac47\" returns successfully" Dec 13 02:01:31.904107 kubelet[1460]: E1213 02:01:31.904083 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:32.904290 kubelet[1460]: E1213 02:01:32.904238 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:33.217827 env[1210]: time="2024-12-13T02:01:33.217701135Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:33.219360 env[1210]: time="2024-12-13T02:01:33.219322369Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:33.220971 env[1210]: time="2024-12-13T02:01:33.220943583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:33.222266 env[1210]: time="2024-12-13T02:01:33.222217925Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:33.222645 env[1210]: time="2024-12-13T02:01:33.222615372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:01:33.224698 env[1210]: time="2024-12-13T02:01:33.224659188Z" level=info msg="CreateContainer within sandbox \"f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:01:33.237542 env[1210]: time="2024-12-13T02:01:33.237496059Z" level=info msg="CreateContainer within sandbox \"f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e36a06be5b4f00d44f1aec70bc214868d1c859887044927ee17e57b87c1efcbd\"" Dec 13 02:01:33.237925 env[1210]: time="2024-12-13T02:01:33.237897533Z" level=info msg="StartContainer for \"e36a06be5b4f00d44f1aec70bc214868d1c859887044927ee17e57b87c1efcbd\"" Dec 13 02:01:33.252197 systemd[1]: Started cri-containerd-e36a06be5b4f00d44f1aec70bc214868d1c859887044927ee17e57b87c1efcbd.scope. Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.284773 kernel: kauditd_printk_skb: 197 callbacks suppressed Dec 13 02:01:33.284831 kernel: audit: type=1400 audit(1734055293.282:757): avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f29477c0cb8 items=0 ppid=3173 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.293750 kernel: audit: type=1300 audit(1734055293.282:757): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f29477c0cb8 items=0 ppid=3173 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.293799 kernel: audit: type=1327 audit(1734055293.282:757): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366130366265356234663030643434663161656337306263323134 Dec 13 02:01:33.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366130366265356234663030643434663161656337306263323134 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.301606 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.305471 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.305565 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.311959 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.315285 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.318495 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.318555 kernel: audit: type=1400 audit(1734055293.282:758): avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.282000 audit: BPF prog-id=131 op=LOAD Dec 13 02:01:33.282000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4c38 items=0 ppid=3173 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366130366265356234663030643434663161656337306263323134 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.287000 audit: BPF prog-id=132 op=LOAD Dec 13 02:01:33.287000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4c88 items=0 ppid=3173 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366130366265356234663030643434663161656337306263323134 Dec 13 02:01:33.297000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:01:33.297000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.297000 audit: BPF prog-id=133 op=LOAD Dec 13 02:01:33.297000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4d18 items=0 ppid=3173 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366130366265356234663030643434663161656337306263323134 Dec 13 02:01:33.626648 env[1210]: time="2024-12-13T02:01:33.626579871Z" level=info msg="StartContainer for \"e36a06be5b4f00d44f1aec70bc214868d1c859887044927ee17e57b87c1efcbd\" returns successfully" Dec 13 02:01:33.628240 env[1210]: time="2024-12-13T02:01:33.628201336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:01:33.905428 kubelet[1460]: E1213 02:01:33.905308 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:34.906495 kubelet[1460]: E1213 02:01:34.906399 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:35.209266 env[1210]: time="2024-12-13T02:01:35.209147993Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:35.211040 env[1210]: time="2024-12-13T02:01:35.210999649Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:35.212243 env[1210]: time="2024-12-13T02:01:35.212212075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:35.213563 env[1210]: time="2024-12-13T02:01:35.213541882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:35.213982 env[1210]: time="2024-12-13T02:01:35.213949697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:01:35.215828 env[1210]: time="2024-12-13T02:01:35.215801022Z" level=info msg="CreateContainer within sandbox \"f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:01:35.228552 env[1210]: time="2024-12-13T02:01:35.228514538Z" level=info msg="CreateContainer within sandbox \"f75614b1005098433e305b86e9b007a7f2700cb0370d5799416db6eea3426044\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"074c79c1e0f96c65d96f7e58baf7177c3d5b6668ee60306217aa45c9efb3fbaa\"" Dec 13 02:01:35.228876 env[1210]: time="2024-12-13T02:01:35.228857082Z" level=info msg="StartContainer for \"074c79c1e0f96c65d96f7e58baf7177c3d5b6668ee60306217aa45c9efb3fbaa\"" Dec 13 02:01:35.245039 systemd[1]: run-containerd-runc-k8s.io-074c79c1e0f96c65d96f7e58baf7177c3d5b6668ee60306217aa45c9efb3fbaa-runc.l2jxaz.mount: Deactivated successfully. Dec 13 02:01:35.246259 systemd[1]: Started cri-containerd-074c79c1e0f96c65d96f7e58baf7177c3d5b6668ee60306217aa45c9efb3fbaa.scope. Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9557a0c1a8 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346337396331653066393663363564393666376535386261663731 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit: BPF prog-id=134 op=LOAD Dec 13 02:01:35.254000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f7f68 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346337396331653066393663363564393666376535386261663731 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit: BPF prog-id=135 op=LOAD Dec 13 02:01:35.254000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f7fb8 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346337396331653066393663363564393666376535386261663731 Dec 13 02:01:35.254000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:01:35.254000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:35.254000 audit: BPF prog-id=136 op=LOAD Dec 13 02:01:35.254000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e4048 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346337396331653066393663363564393666376535386261663731 Dec 13 02:01:35.266167 env[1210]: time="2024-12-13T02:01:35.266108450Z" level=info msg="StartContainer for \"074c79c1e0f96c65d96f7e58baf7177c3d5b6668ee60306217aa45c9efb3fbaa\" returns successfully" Dec 13 02:01:35.327785 kubelet[1460]: I1213 02:01:35.327745 1460 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:01:35.327785 kubelet[1460]: I1213 02:01:35.327778 1460 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:01:35.642017 kubelet[1460]: I1213 02:01:35.641967 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-xz4sf" podStartSLOduration=57.531497492 podStartE2EDuration="1m1.641952198s" podCreationTimestamp="2024-12-13 02:00:34 +0000 UTC" firstStartedPulling="2024-12-13 02:01:27.615853994 +0000 UTC m=+70.143625474" lastFinishedPulling="2024-12-13 02:01:31.7263087 +0000 UTC m=+74.254080180" observedRunningTime="2024-12-13 02:01:32.46237929 +0000 UTC m=+74.990150770" watchObservedRunningTime="2024-12-13 02:01:35.641952198 +0000 UTC m=+78.169723678" Dec 13 02:01:35.907132 kubelet[1460]: E1213 02:01:35.907035 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:36.907446 kubelet[1460]: E1213 02:01:36.907394 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:37.865178 kubelet[1460]: E1213 02:01:37.865137 1460 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:37.907792 kubelet[1460]: E1213 02:01:37.907732 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:38.908801 kubelet[1460]: E1213 02:01:38.908759 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:39.157000 audit[3345]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=3345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.160189 kernel: kauditd_printk_skb: 76 callbacks suppressed Dec 13 02:01:39.160236 kernel: audit: type=1325 audit(1734055299.157:769): table=filter:87 family=2 entries=20 op=nft_register_rule pid=3345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.157000 audit[3345]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd22029d20 a2=0 a3=7ffd22029d0c items=0 ppid=1740 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.167024 kernel: audit: type=1300 audit(1734055299.157:769): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd22029d20 a2=0 a3=7ffd22029d0c items=0 ppid=1740 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.167080 kernel: audit: type=1327 audit(1734055299.157:769): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.171000 audit[3345]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=3345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.171000 audit[3345]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd22029d20 a2=0 a3=0 items=0 ppid=1740 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.179892 kernel: audit: type=1325 audit(1734055299.171:770): table=nat:88 family=2 entries=22 op=nft_register_rule pid=3345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.179940 kernel: audit: type=1300 audit(1734055299.171:770): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd22029d20 a2=0 a3=0 items=0 ppid=1740 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.179973 kernel: audit: type=1327 audit(1734055299.171:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.186000 audit[3347]: NETFILTER_CFG table=filter:89 family=2 entries=32 op=nft_register_rule pid=3347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.186000 audit[3347]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff902cbf00 a2=0 a3=7fff902cbeec items=0 ppid=1740 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.195810 kernel: audit: type=1325 audit(1734055299.186:771): table=filter:89 family=2 entries=32 op=nft_register_rule pid=3347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.195870 kernel: audit: type=1300 audit(1734055299.186:771): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff902cbf00 a2=0 a3=7fff902cbeec items=0 ppid=1740 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.195894 kernel: audit: type=1327 audit(1734055299.186:771): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.199135 kubelet[1460]: I1213 02:01:39.199093 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-r5cpj" podStartSLOduration=75.733024677 podStartE2EDuration="1m21.199073532s" podCreationTimestamp="2024-12-13 02:00:18 +0000 UTC" firstStartedPulling="2024-12-13 02:01:29.748611746 +0000 UTC m=+72.276383226" lastFinishedPulling="2024-12-13 02:01:35.214660601 +0000 UTC m=+77.742432081" observedRunningTime="2024-12-13 02:01:35.641887677 +0000 UTC m=+78.169659157" watchObservedRunningTime="2024-12-13 02:01:39.199073532 +0000 UTC m=+81.726845012" Dec 13 02:01:39.199410 kubelet[1460]: I1213 02:01:39.199388 1460 topology_manager.go:215] "Topology Admit Handler" podUID="f74c4f5e-d715-41a7-9552-c4201284e734" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 02:01:39.198000 audit[3347]: NETFILTER_CFG table=nat:90 family=2 entries=22 op=nft_register_rule pid=3347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.198000 audit[3347]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff902cbf00 a2=0 a3=0 items=0 ppid=1740 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.203552 kernel: audit: type=1325 audit(1734055299.198:772): table=nat:90 family=2 entries=22 op=nft_register_rule pid=3347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.203790 systemd[1]: Created slice kubepods-besteffort-podf74c4f5e_d715_41a7_9552_c4201284e734.slice. Dec 13 02:01:39.293229 kubelet[1460]: I1213 02:01:39.293197 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vr2wm\" (UniqueName: \"kubernetes.io/projected/f74c4f5e-d715-41a7-9552-c4201284e734-kube-api-access-vr2wm\") pod \"nfs-server-provisioner-0\" (UID: \"f74c4f5e-d715-41a7-9552-c4201284e734\") " pod="default/nfs-server-provisioner-0" Dec 13 02:01:39.293319 kubelet[1460]: I1213 02:01:39.293232 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f74c4f5e-d715-41a7-9552-c4201284e734-data\") pod \"nfs-server-provisioner-0\" (UID: \"f74c4f5e-d715-41a7-9552-c4201284e734\") " pod="default/nfs-server-provisioner-0" Dec 13 02:01:39.506609 env[1210]: time="2024-12-13T02:01:39.506507315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f74c4f5e-d715-41a7-9552-c4201284e734,Namespace:default,Attempt:0,}" Dec 13 02:01:39.601063 systemd-networkd[1040]: cali60e51b789ff: Link UP Dec 13 02:01:39.604019 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:39.604075 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 02:01:39.604227 systemd-networkd[1040]: cali60e51b789ff: Gained carrier Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.548 [INFO][3350] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f74c4f5e-d715-41a7-9552-c4201284e734 1353 0 2024-12-13 02:01:39 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.142 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.548 [INFO][3350] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.570 [INFO][3365] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" HandleID="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.578 [INFO][3365] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" HandleID="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004b8b60), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:01:39.5703022 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.578 [INFO][3365] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.578 [INFO][3365] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.579 [INFO][3365] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.580 [INFO][3365] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.583 [INFO][3365] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.586 [INFO][3365] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.587 [INFO][3365] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.589 [INFO][3365] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.589 [INFO][3365] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.590 [INFO][3365] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.594 [INFO][3365] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.598 [INFO][3365] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.131/26] block=192.168.25.128/26 handle="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.598 [INFO][3365] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.131/26] handle="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" host="10.0.0.142" Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.598 [INFO][3365] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:39.612902 env[1210]: 2024-12-13 02:01:39.598 [INFO][3365] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.131/26] IPv6=[] ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" HandleID="k8s-pod-network.677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.613773 env[1210]: 2024-12-13 02:01:39.599 [INFO][3350] cni-plugin/k8s.go 386: Populated endpoint ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f74c4f5e-d715-41a7-9552-c4201284e734", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:39.613773 env[1210]: 2024-12-13 02:01:39.599 [INFO][3350] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.131/32] ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.613773 env[1210]: 2024-12-13 02:01:39.599 [INFO][3350] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.613773 env[1210]: 2024-12-13 02:01:39.604 [INFO][3350] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.613982 env[1210]: 2024-12-13 02:01:39.604 [INFO][3350] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f74c4f5e-d715-41a7-9552-c4201284e734", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"fa:2c:90:1a:57:0d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:39.613982 env[1210]: 2024-12-13 02:01:39.610 [INFO][3350] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:01:39.620000 audit[3388]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:39.620000 audit[3388]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc3df590c0 a2=0 a3=7ffc3df590ac items=0 ppid=2754 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.620000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:39.648573 env[1210]: time="2024-12-13T02:01:39.648471203Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:39.648573 env[1210]: time="2024-12-13T02:01:39.648521628Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:39.648573 env[1210]: time="2024-12-13T02:01:39.648547466Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:39.649054 env[1210]: time="2024-12-13T02:01:39.648972935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf pid=3396 runtime=io.containerd.runc.v2 Dec 13 02:01:39.666345 systemd[1]: Started cri-containerd-677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf.scope. Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit: BPF prog-id=137 op=LOAD Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3396 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373132316431663461353830343630323864356334306137356633 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3396 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373132316431663461353830343630323864356334306137356633 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit: BPF prog-id=138 op=LOAD Dec 13 02:01:39.673000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031fd60 items=0 ppid=3396 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373132316431663461353830343630323864356334306137356633 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit: BPF prog-id=139 op=LOAD Dec 13 02:01:39.673000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031fda8 items=0 ppid=3396 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373132316431663461353830343630323864356334306137356633 Dec 13 02:01:39.673000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:01:39.673000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:39.673000 audit: BPF prog-id=140 op=LOAD Dec 13 02:01:39.673000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003881b8 items=0 ppid=3396 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373132316431663461353830343630323864356334306137356633 Dec 13 02:01:39.675836 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:39.694224 env[1210]: time="2024-12-13T02:01:39.694183890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f74c4f5e-d715-41a7-9552-c4201284e734,Namespace:default,Attempt:0,} returns sandbox id \"677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf\"" Dec 13 02:01:39.695508 env[1210]: time="2024-12-13T02:01:39.695471717Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 02:01:39.909213 kubelet[1460]: E1213 02:01:39.909172 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:40.403121 systemd[1]: run-containerd-runc-k8s.io-677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf-runc.mF2QzT.mount: Deactivated successfully. Dec 13 02:01:40.910182 kubelet[1460]: E1213 02:01:40.910146 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:41.062665 systemd-networkd[1040]: cali60e51b789ff: Gained IPv6LL Dec 13 02:01:41.911325 kubelet[1460]: E1213 02:01:41.911261 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:42.044876 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3126318661.mount: Deactivated successfully. Dec 13 02:01:42.323363 kubelet[1460]: E1213 02:01:42.323269 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:42.912414 kubelet[1460]: E1213 02:01:42.912362 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:43.913424 kubelet[1460]: E1213 02:01:43.913391 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:44.416325 env[1210]: time="2024-12-13T02:01:44.416274649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:44.418209 env[1210]: time="2024-12-13T02:01:44.418169048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:44.419827 env[1210]: time="2024-12-13T02:01:44.419779497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:44.421232 env[1210]: time="2024-12-13T02:01:44.421210728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:44.421819 env[1210]: time="2024-12-13T02:01:44.421786803Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 02:01:44.423869 env[1210]: time="2024-12-13T02:01:44.423836232Z" level=info msg="CreateContainer within sandbox \"677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 02:01:44.433229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4280268446.mount: Deactivated successfully. Dec 13 02:01:44.435125 env[1210]: time="2024-12-13T02:01:44.435095769Z" level=info msg="CreateContainer within sandbox \"677121d1f4a58046028d5c40a75f36ae5152053aefb56437957d0e9d22c640bf\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"98a59a4d95232e6dd02e84e9397f3b7afa3dadf7b11bc779c68ab8d45a4fea3a\"" Dec 13 02:01:44.435496 env[1210]: time="2024-12-13T02:01:44.435464883Z" level=info msg="StartContainer for \"98a59a4d95232e6dd02e84e9397f3b7afa3dadf7b11bc779c68ab8d45a4fea3a\"" Dec 13 02:01:44.454207 systemd[1]: Started cri-containerd-98a59a4d95232e6dd02e84e9397f3b7afa3dadf7b11bc779c68ab8d45a4fea3a.scope. Dec 13 02:01:44.464564 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 02:01:44.464676 kernel: audit: type=1400 audit(1734055304.460:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.468949 kernel: audit: type=1400 audit(1734055304.460:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.469005 kernel: audit: type=1400 audit(1734055304.460:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.475153 kernel: audit: type=1400 audit(1734055304.460:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.475197 kernel: audit: type=1400 audit(1734055304.460:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.481000 kernel: audit: type=1400 audit(1734055304.460:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.481041 kernel: audit: type=1400 audit(1734055304.460:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.483955 kernel: audit: type=1400 audit(1734055304.460:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.489693 kernel: audit: type=1400 audit(1734055304.460:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.489740 kernel: audit: type=1400 audit(1734055304.464:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit: BPF prog-id=141 op=LOAD Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3396 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613539613464393532333265366464303265383465393339376633 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3396 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613539613464393532333265366464303265383465393339376633 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.464000 audit: BPF prog-id=142 op=LOAD Dec 13 02:01:44.464000 audit[3438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000314b20 items=0 ppid=3396 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613539613464393532333265366464303265383465393339376633 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.467000 audit: BPF prog-id=143 op=LOAD Dec 13 02:01:44.467000 audit[3438]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000314b68 items=0 ppid=3396 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613539613464393532333265366464303265383465393339376633 Dec 13 02:01:44.470000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:01:44.470000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:44.470000 audit: BPF prog-id=144 op=LOAD Dec 13 02:01:44.470000 audit[3438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000314f78 items=0 ppid=3396 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613539613464393532333265366464303265383465393339376633 Dec 13 02:01:44.501413 env[1210]: time="2024-12-13T02:01:44.501374425Z" level=info msg="StartContainer for \"98a59a4d95232e6dd02e84e9397f3b7afa3dadf7b11bc779c68ab8d45a4fea3a\" returns successfully" Dec 13 02:01:44.534000 audit[3466]: AVC avc: denied { search } for pid=3466 comm="rpcbind" name="crypto" dev="proc" ino=24857 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:01:44.534000 audit[3466]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f07d78ad0c0 a2=0 a3=0 items=0 ppid=3447 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 key=(null) Dec 13 02:01:44.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 02:01:44.564000 audit[3471]: AVC avc: denied { search } for pid=3471 comm="dbus-daemon" name="crypto" dev="proc" ino=24857 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:01:44.564000 audit[3471]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4cb886d0c0 a2=0 a3=0 items=0 ppid=3447 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 key=(null) Dec 13 02:01:44.564000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:01:44.566000 audit[3472]: AVC avc: denied { watch } for pid=3472 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538750 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c182,c652 tclass=dir permissive=0 Dec 13 02:01:44.566000 audit[3472]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=557e7b9ac940 a2=2c8 a3=7fffe933188c items=0 ppid=3447 pid=3472 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 key=(null) Dec 13 02:01:44.566000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:01:44.569000 audit[3473]: AVC avc: denied { read } for pid=3473 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24882 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 02:01:44.569000 audit[3473]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2675ca6320 a1=80000 a2=d a3=7ffcbec852a0 items=0 ppid=3447 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 key=(null) Dec 13 02:01:44.569000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:01:44.569000 audit[3473]: AVC avc: denied { search } for pid=3473 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24857 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:01:44.569000 audit[3473]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f26751fa0c0 a2=0 a3=0 items=0 ppid=3447 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c652 key=(null) Dec 13 02:01:44.569000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:01:44.657543 kubelet[1460]: I1213 02:01:44.657492 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.930052596 podStartE2EDuration="5.657478069s" podCreationTimestamp="2024-12-13 02:01:39 +0000 UTC" firstStartedPulling="2024-12-13 02:01:39.695243449 +0000 UTC m=+82.223014929" lastFinishedPulling="2024-12-13 02:01:44.422668922 +0000 UTC m=+86.950440402" observedRunningTime="2024-12-13 02:01:44.657260067 +0000 UTC m=+87.185031547" watchObservedRunningTime="2024-12-13 02:01:44.657478069 +0000 UTC m=+87.185249549" Dec 13 02:01:44.668000 audit[3493]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=3493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:44.668000 audit[3493]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcafcac4c0 a2=0 a3=7ffcafcac4ac items=0 ppid=1740 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:44.676000 audit[3493]: NETFILTER_CFG table=nat:93 family=2 entries=106 op=nft_register_chain pid=3493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:44.676000 audit[3493]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcafcac4c0 a2=0 a3=7ffcafcac4ac items=0 ppid=1740 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:44.914083 kubelet[1460]: E1213 02:01:44.914049 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:44.973351 kubelet[1460]: E1213 02:01:44.973255 1460 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:45.915195 kubelet[1460]: E1213 02:01:45.915149 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:46.915484 kubelet[1460]: E1213 02:01:46.915448 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:47.915693 kubelet[1460]: E1213 02:01:47.915666 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:48.916746 kubelet[1460]: E1213 02:01:48.916690 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:49.917273 kubelet[1460]: E1213 02:01:49.917201 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:50.917659 kubelet[1460]: E1213 02:01:50.917613 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:51.918456 kubelet[1460]: E1213 02:01:51.918395 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:52.919092 kubelet[1460]: E1213 02:01:52.919038 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:53.919162 kubelet[1460]: E1213 02:01:53.919130 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:54.142482 kubelet[1460]: I1213 02:01:54.142452 1460 topology_manager.go:215] "Topology Admit Handler" podUID="56c55220-bb9e-4e85-a20c-0b99df2ae640" podNamespace="default" podName="test-pod-1" Dec 13 02:01:54.146408 systemd[1]: Created slice kubepods-besteffort-pod56c55220_bb9e_4e85_a20c_0b99df2ae640.slice. Dec 13 02:01:54.165191 kubelet[1460]: I1213 02:01:54.165160 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9chdv\" (UniqueName: \"kubernetes.io/projected/56c55220-bb9e-4e85-a20c-0b99df2ae640-kube-api-access-9chdv\") pod \"test-pod-1\" (UID: \"56c55220-bb9e-4e85-a20c-0b99df2ae640\") " pod="default/test-pod-1" Dec 13 02:01:54.165259 kubelet[1460]: I1213 02:01:54.165192 1460 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-adc8ff1f-8caa-4d02-9ad5-cecd73cec43f\" (UniqueName: \"kubernetes.io/nfs/56c55220-bb9e-4e85-a20c-0b99df2ae640-pvc-adc8ff1f-8caa-4d02-9ad5-cecd73cec43f\") pod \"test-pod-1\" (UID: \"56c55220-bb9e-4e85-a20c-0b99df2ae640\") " pod="default/test-pod-1" Dec 13 02:01:54.274000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.276969 kernel: Failed to create system directory netfs Dec 13 02:01:54.277051 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:01:54.277076 kernel: audit: type=1400 audit(1734055314.274:817): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.277109 kernel: Failed to create system directory netfs Dec 13 02:01:54.277871 kernel: audit: type=1400 audit(1734055314.274:817): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.274000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.274000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.285684 kernel: Failed to create system directory netfs Dec 13 02:01:54.285712 kernel: audit: type=1400 audit(1734055314.274:817): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.285727 kernel: Failed to create system directory netfs Dec 13 02:01:54.288882 kernel: audit: type=1400 audit(1734055314.274:817): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.274000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.274000 audit[3525]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560d9e11c5e0 a1=153bc a2=560d9a3f02b0 a3=5 items=0 ppid=68 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.274000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:01:54.299630 kernel: audit: type=1300 audit(1734055314.274:817): arch=c000003e syscall=175 success=yes exit=0 a0=560d9e11c5e0 a1=153bc a2=560d9a3f02b0 a3=5 items=0 ppid=68 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.299788 kernel: audit: type=1327 audit(1734055314.274:817): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.300601 kernel: Failed to create system directory fscache Dec 13 02:01:54.300649 kernel: audit: type=1400 audit(1734055314.297:818): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.300688 kernel: Failed to create system directory fscache Dec 13 02:01:54.300703 kernel: Failed to create system directory fscache Dec 13 02:01:54.300717 kernel: Failed to create system directory fscache Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.305233 kernel: audit: type=1400 audit(1734055314.297:818): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.305280 kernel: Failed to create system directory fscache Dec 13 02:01:54.305299 kernel: audit: type=1400 audit(1734055314.297:818): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.305963 kernel: Failed to create system directory fscache Dec 13 02:01:54.305999 kernel: Failed to create system directory fscache Dec 13 02:01:54.309135 kernel: audit: type=1400 audit(1734055314.297:818): avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.309883 kernel: Failed to create system directory fscache Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.319320 kernel: Failed to create system directory fscache Dec 13 02:01:54.319354 kernel: Failed to create system directory fscache Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.320873 kernel: Failed to create system directory fscache Dec 13 02:01:54.320902 kernel: Failed to create system directory fscache Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.297000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.323166 kernel: Failed to create system directory fscache Dec 13 02:01:54.323213 kernel: Failed to create system directory fscache Dec 13 02:01:54.297000 audit[3525]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560d9e3319c0 a1=4c0fc a2=560d9a3f02b0 a3=5 items=0 ppid=68 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.297000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:01:54.325556 kernel: FS-Cache: Loaded Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.354822 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.354859 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.354881 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.357059 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.357087 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.357111 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.358602 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.358648 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.360057 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.360080 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.361549 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.361576 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.363017 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.363044 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.365213 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.365235 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.365257 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.366711 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.366737 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.368172 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.368235 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.369666 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.369690 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.371118 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.371159 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.371878 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.374060 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.374082 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.374103 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.375559 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.375581 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.376994 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.377015 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.379177 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.379197 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.379209 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.380662 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.380691 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.382093 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.382115 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.383547 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.383568 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.384965 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.385079 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.387114 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.387136 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.387150 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.388562 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.388585 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.389987 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.390007 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.392137 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.392162 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.392176 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.393583 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.393607 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.395010 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.395037 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.397158 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.397178 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.397197 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.398629 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.398652 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.400102 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.400125 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.400845 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.402986 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.403018 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.403034 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.405168 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.405195 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.405209 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.406655 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.406681 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.408080 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.408102 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.410226 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.410243 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.410267 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.411675 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.411712 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.413103 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.413124 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.414541 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.414562 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.415970 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.415991 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.418150 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.418170 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.418191 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.419600 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.419629 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.421025 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.421043 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.423172 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.423190 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.423208 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.424622 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.424645 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.426046 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.426073 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.428195 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.428213 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.428230 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.429636 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.429659 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.431062 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.431083 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.433216 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.433237 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.433260 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.434659 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.434682 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.436081 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.436098 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.438239 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.438275 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.438289 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.439700 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.439724 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.441134 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.441156 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.442589 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.442613 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.444024 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.444041 kernel: Failed to create system directory sunrpc Dec 13 02:01:54.344000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.453914 kernel: RPC: Registered named UNIX socket transport module. Dec 13 02:01:54.453953 kernel: RPC: Registered udp transport module. Dec 13 02:01:54.453970 kernel: RPC: Registered tcp transport module. Dec 13 02:01:54.454599 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 02:01:54.344000 audit[3525]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560d9e37dad0 a1=1a7f1c a2=560d9a3f02b0 a3=5 items=6 ppid=68 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.344000 audit: CWD cwd="/" Dec 13 02:01:54.344000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:54.344000 audit: PATH item=1 name=(null) inode=24943 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:54.344000 audit: PATH item=2 name=(null) inode=24943 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:54.344000 audit: PATH item=3 name=(null) inode=24944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:54.344000 audit: PATH item=4 name=(null) inode=24943 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:54.344000 audit: PATH item=5 name=(null) inode=24945 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:54.344000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.488108 kernel: Failed to create system directory nfs Dec 13 02:01:54.488135 kernel: Failed to create system directory nfs Dec 13 02:01:54.488151 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.490167 kernel: Failed to create system directory nfs Dec 13 02:01:54.490205 kernel: Failed to create system directory nfs Dec 13 02:01:54.490219 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.491543 kernel: Failed to create system directory nfs Dec 13 02:01:54.491580 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.492897 kernel: Failed to create system directory nfs Dec 13 02:01:54.492919 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.494950 kernel: Failed to create system directory nfs Dec 13 02:01:54.494970 kernel: Failed to create system directory nfs Dec 13 02:01:54.494982 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.496992 kernel: Failed to create system directory nfs Dec 13 02:01:54.497014 kernel: Failed to create system directory nfs Dec 13 02:01:54.497029 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.499039 kernel: Failed to create system directory nfs Dec 13 02:01:54.499062 kernel: Failed to create system directory nfs Dec 13 02:01:54.499077 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.501101 kernel: Failed to create system directory nfs Dec 13 02:01:54.501132 kernel: Failed to create system directory nfs Dec 13 02:01:54.501151 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.502614 kernel: Failed to create system directory nfs Dec 13 02:01:54.502646 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.504063 kernel: Failed to create system directory nfs Dec 13 02:01:54.504084 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.506134 kernel: Failed to create system directory nfs Dec 13 02:01:54.506160 kernel: Failed to create system directory nfs Dec 13 02:01:54.506176 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.508183 kernel: Failed to create system directory nfs Dec 13 02:01:54.508204 kernel: Failed to create system directory nfs Dec 13 02:01:54.508217 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.509565 kernel: Failed to create system directory nfs Dec 13 02:01:54.509589 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.510917 kernel: Failed to create system directory nfs Dec 13 02:01:54.510990 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.512954 kernel: Failed to create system directory nfs Dec 13 02:01:54.512972 kernel: Failed to create system directory nfs Dec 13 02:01:54.512989 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.514991 kernel: Failed to create system directory nfs Dec 13 02:01:54.515009 kernel: Failed to create system directory nfs Dec 13 02:01:54.515023 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.517033 kernel: Failed to create system directory nfs Dec 13 02:01:54.517051 kernel: Failed to create system directory nfs Dec 13 02:01:54.517072 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.519076 kernel: Failed to create system directory nfs Dec 13 02:01:54.519098 kernel: Failed to create system directory nfs Dec 13 02:01:54.519111 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.521116 kernel: Failed to create system directory nfs Dec 13 02:01:54.521137 kernel: Failed to create system directory nfs Dec 13 02:01:54.521156 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.523159 kernel: Failed to create system directory nfs Dec 13 02:01:54.523176 kernel: Failed to create system directory nfs Dec 13 02:01:54.523189 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.524545 kernel: Failed to create system directory nfs Dec 13 02:01:54.524562 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.525891 kernel: Failed to create system directory nfs Dec 13 02:01:54.525908 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.480000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.528567 kernel: Failed to create system directory nfs Dec 13 02:01:54.528646 kernel: Failed to create system directory nfs Dec 13 02:01:54.480000 audit[3525]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560d9e59e700 a1=16e97c a2=560d9a3f02b0 a3=5 items=0 ppid=68 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.480000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:01:54.550551 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.585737 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.585769 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.585782 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.587120 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.587137 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.589205 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.589224 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.589237 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.590611 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.590629 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.591998 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.592035 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.594063 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.594115 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.594130 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.596140 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.596170 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.596191 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.598212 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.598231 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.598244 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.599602 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.599620 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.600980 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.601000 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.603052 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.603071 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.603090 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.605125 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.605142 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.605154 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.607198 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.607214 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.607227 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.608591 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.608608 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.609965 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.609987 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.612042 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.612070 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.612085 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.614126 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.614145 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.614158 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.616191 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.616207 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.616224 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.617589 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.617607 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.618962 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.618986 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.621037 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.621067 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.621087 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.623101 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.623118 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.623138 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.625168 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.625184 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.625197 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.626572 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.626589 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.627943 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.627960 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.630012 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.630030 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.630043 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.631550 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.631587 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.632906 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.632934 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.634980 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.634998 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.635012 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.637051 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.637074 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.637088 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.639122 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.639141 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.639154 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.641217 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.641257 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.641271 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.642622 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.642646 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.644003 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.644024 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.646080 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.646101 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.646114 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.648156 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.648173 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.648186 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.574000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.649569 kernel: Failed to create system directory nfs4 Dec 13 02:01:54.792898 kernel: NFS: Registering the id_resolver key type Dec 13 02:01:54.792944 kernel: Key type id_resolver registered Dec 13 02:01:54.792959 kernel: Key type id_legacy registered Dec 13 02:01:54.574000 audit[3530]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f35e3dc1010 a1=208de4 a2=55965c1a12b0 a3=5 items=0 ppid=68 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.574000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.804563 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.804613 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.804630 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.805990 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.806012 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.808137 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.808167 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.808191 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.809587 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.809605 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.811019 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.811063 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.813170 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.813196 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.813210 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.814615 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.814635 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.816040 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.816058 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.818189 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.818211 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.818225 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.819640 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.819657 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.821069 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.821086 kernel: Failed to create system directory rpcgss Dec 13 02:01:54.800000 audit[3531]: AVC avc: denied { confidentiality } for pid=3531 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:54.800000 audit[3531]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f442b5fd010 a1=70af4 a2=55d778bc92b0 a3=5 items=0 ppid=68 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.800000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 02:01:54.832288 nfsidmap[3539]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 02:01:54.834697 nfsidmap[3542]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 02:01:54.843000 audit[1278]: AVC avc: denied { watch_reads } for pid=1278 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:01:54.843000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:01:54.843000 audit[1278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561e219dfa00 a2=10 a3=5fb3da5007f96508 items=0 ppid=1 pid=1278 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.843000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:01:54.843000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:01:54.843000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:01:54.843000 audit[1278]: AVC avc: denied { watch_reads } for pid=1278 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:01:54.843000 audit[1278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561e219dfa00 a2=10 a3=5fb3da5007f96508 items=0 ppid=1 pid=1278 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.843000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:01:54.843000 audit[1278]: AVC avc: denied { watch_reads } for pid=1278 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:01:54.843000 audit[1278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561e219dfa00 a2=10 a3=5fb3da5007f96508 items=0 ppid=1 pid=1278 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:54.843000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:01:54.919885 kubelet[1460]: E1213 02:01:54.919859 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:55.049804 env[1210]: time="2024-12-13T02:01:55.049187131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:56c55220-bb9e-4e85-a20c-0b99df2ae640,Namespace:default,Attempt:0,}" Dec 13 02:01:55.154875 systemd-networkd[1040]: cali5ec59c6bf6e: Link UP Dec 13 02:01:55.157449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:55.157485 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 02:01:55.157734 systemd-networkd[1040]: cali5ec59c6bf6e: Gained carrier Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.105 [INFO][3546] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-test--pod--1-eth0 default 56c55220-bb9e-4e85-a20c-0b99df2ae640 1434 0 2024-12-13 02:01:39 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.142 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.105 [INFO][3546] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.125 [INFO][3559] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" HandleID="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Workload="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.132 [INFO][3559] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" HandleID="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Workload="10.0.0.142-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b04d0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"test-pod-1", "timestamp":"2024-12-13 02:01:55.125848726 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.132 [INFO][3559] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.132 [INFO][3559] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.132 [INFO][3559] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.134 [INFO][3559] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.136 [INFO][3559] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.140 [INFO][3559] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.141 [INFO][3559] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.143 [INFO][3559] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.143 [INFO][3559] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.144 [INFO][3559] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54 Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.147 [INFO][3559] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.152 [INFO][3559] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.132/26] block=192.168.25.128/26 handle="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.152 [INFO][3559] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.132/26] handle="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" host="10.0.0.142" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.152 [INFO][3559] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.152 [INFO][3559] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.132/26] IPv6=[] ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" HandleID="k8s-pod-network.16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Workload="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.165278 env[1210]: 2024-12-13 02:01:55.153 [INFO][3546] cni-plugin/k8s.go 386: Populated endpoint ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"56c55220-bb9e-4e85-a20c-0b99df2ae640", ResourceVersion:"1434", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:55.165917 env[1210]: 2024-12-13 02:01:55.153 [INFO][3546] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.132/32] ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.165917 env[1210]: 2024-12-13 02:01:55.153 [INFO][3546] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.165917 env[1210]: 2024-12-13 02:01:55.157 [INFO][3546] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.165917 env[1210]: 2024-12-13 02:01:55.157 [INFO][3546] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"56c55220-bb9e-4e85-a20c-0b99df2ae640", ResourceVersion:"1434", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"7e:25:0d:98:a8:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:55.165917 env[1210]: 2024-12-13 02:01:55.163 [INFO][3546] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" Dec 13 02:01:55.173000 audit[3585]: NETFILTER_CFG table=filter:94 family=2 entries=38 op=nft_register_chain pid=3585 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:55.173000 audit[3585]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe5b002a30 a2=0 a3=7ffe5b002a1c items=0 ppid=2754 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.173000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:55.174997 env[1210]: time="2024-12-13T02:01:55.174695968Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:55.174997 env[1210]: time="2024-12-13T02:01:55.174728902Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:55.174997 env[1210]: time="2024-12-13T02:01:55.174738480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:55.174997 env[1210]: time="2024-12-13T02:01:55.174861616Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54 pid=3589 runtime=io.containerd.runc.v2 Dec 13 02:01:55.183382 systemd[1]: Started cri-containerd-16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54.scope. Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit: BPF prog-id=145 op=LOAD Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3589 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136663535363733303136393066623134303666383937373336346561 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3589 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136663535363733303136393066623134303666383937373336346561 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.192000 audit: BPF prog-id=146 op=LOAD Dec 13 02:01:55.192000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000225790 items=0 ppid=3589 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136663535363733303136393066623134303666383937373336346561 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit: BPF prog-id=147 op=LOAD Dec 13 02:01:55.193000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002257d8 items=0 ppid=3589 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136663535363733303136393066623134303666383937373336346561 Dec 13 02:01:55.193000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:01:55.193000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.193000 audit: BPF prog-id=148 op=LOAD Dec 13 02:01:55.193000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000225be8 items=0 ppid=3589 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136663535363733303136393066623134303666383937373336346561 Dec 13 02:01:55.194305 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:55.212710 env[1210]: time="2024-12-13T02:01:55.212674524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:56c55220-bb9e-4e85-a20c-0b99df2ae640,Namespace:default,Attempt:0,} returns sandbox id \"16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54\"" Dec 13 02:01:55.214301 env[1210]: time="2024-12-13T02:01:55.214280709Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:01:55.576181 env[1210]: time="2024-12-13T02:01:55.576131394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:55.577878 env[1210]: time="2024-12-13T02:01:55.577836519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:55.579347 env[1210]: time="2024-12-13T02:01:55.579312654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:55.580865 env[1210]: time="2024-12-13T02:01:55.580823215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:55.581516 env[1210]: time="2024-12-13T02:01:55.581482061Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:01:55.583603 env[1210]: time="2024-12-13T02:01:55.583569761Z" level=info msg="CreateContainer within sandbox \"16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 02:01:55.596512 env[1210]: time="2024-12-13T02:01:55.596469387Z" level=info msg="CreateContainer within sandbox \"16f5567301690fb1406f8977364ea1fb10a461c53878470bc0c9a3bd7e4d9c54\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"1d27de9ad084554aab9a7479f6b97b3f683e64bb71c5903d95d3bef5c7d8105c\"" Dec 13 02:01:55.596832 env[1210]: time="2024-12-13T02:01:55.596801295Z" level=info msg="StartContainer for \"1d27de9ad084554aab9a7479f6b97b3f683e64bb71c5903d95d3bef5c7d8105c\"" Dec 13 02:01:55.611860 systemd[1]: Started cri-containerd-1d27de9ad084554aab9a7479f6b97b3f683e64bb71c5903d95d3bef5c7d8105c.scope. Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit: BPF prog-id=149 op=LOAD Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3589 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323764653961643038343535346161623961373437396636623937 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3589 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323764653961643038343535346161623961373437396636623937 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit: BPF prog-id=150 op=LOAD Dec 13 02:01:55.622000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d0c00 items=0 ppid=3589 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323764653961643038343535346161623961373437396636623937 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit: BPF prog-id=151 op=LOAD Dec 13 02:01:55.622000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d0c48 items=0 ppid=3589 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323764653961643038343535346161623961373437396636623937 Dec 13 02:01:55.622000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:01:55.622000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:55.622000 audit: BPF prog-id=152 op=LOAD Dec 13 02:01:55.622000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d1058 items=0 ppid=3589 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164323764653961643038343535346161623961373437396636623937 Dec 13 02:01:55.633623 env[1210]: time="2024-12-13T02:01:55.633575939Z" level=info msg="StartContainer for \"1d27de9ad084554aab9a7479f6b97b3f683e64bb71c5903d95d3bef5c7d8105c\" returns successfully" Dec 13 02:01:55.673323 kubelet[1460]: I1213 02:01:55.673259 1460 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.304657688 podStartE2EDuration="16.673244331s" podCreationTimestamp="2024-12-13 02:01:39 +0000 UTC" firstStartedPulling="2024-12-13 02:01:55.213889958 +0000 UTC m=+97.741661438" lastFinishedPulling="2024-12-13 02:01:55.582476611 +0000 UTC m=+98.110248081" observedRunningTime="2024-12-13 02:01:55.673169437 +0000 UTC m=+98.200940917" watchObservedRunningTime="2024-12-13 02:01:55.673244331 +0000 UTC m=+98.201015801" Dec 13 02:01:55.920389 kubelet[1460]: E1213 02:01:55.920355 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:56.274330 systemd[1]: run-containerd-runc-k8s.io-1d27de9ad084554aab9a7479f6b97b3f683e64bb71c5903d95d3bef5c7d8105c-runc.wVjjmR.mount: Deactivated successfully. Dec 13 02:01:56.614680 systemd-networkd[1040]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 02:01:56.921283 kubelet[1460]: E1213 02:01:56.921146 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:57.865271 kubelet[1460]: E1213 02:01:57.865200 1460 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:57.921836 kubelet[1460]: E1213 02:01:57.921792 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:58.922895 kubelet[1460]: E1213 02:01:58.922844 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:01:59.923009 kubelet[1460]: E1213 02:01:59.922954 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:02:00.924068 kubelet[1460]: E1213 02:02:00.924022 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:02:01.924449 kubelet[1460]: E1213 02:02:01.924417 1460 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"